메뉴 건너뛰기




Volumn , Issue , 2004, Pages 321-328

Qualitative and quantitative analytical techniques for network security assessment

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY MANAGEMENT; OBJECT-ORIENTED NETWORK MODELS; RETURN ON INVESTMENT (ROI); VULNERABILITY MODELS;

EID: 15944397932     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (20)
  • 11
    • 84878033973 scopus 로고    scopus 로고
    • I. Internet Security Systems, "Internet scanner." http://www.iss.net.
    • Internet Scanner
  • 13
    • 84860100271 scopus 로고    scopus 로고
    • Nessus. http://www.nessus.org.
  • 14
    • 84860107642 scopus 로고    scopus 로고
    • Rapid7, Inc, "NeXpose." http://www.rapid7.com.
    • NeXpose
  • 15
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • B. Schneier, "Attack trees: Modeling security threats," Dr. Dobb's Journal, pp. 21-29, December 1999.
    • (1999) Dr. Dobb's Journal , pp. 21-29
    • Schneier, B.1
  • 16
    • 0003487308 scopus 로고    scopus 로고
    • John Wiley and Sons
    • B. Schneier, Secrets and Lies, pp. 318-333. John Wiley and Sons, 2000.
    • (2000) Secrets and Lies , pp. 318-333
    • Schneier, B.1
  • 17
    • 15944398393 scopus 로고    scopus 로고
    • A software fault tree approach to requirements analysis of an intrusion detection system
    • G. H. et al., "A software fault tree approach to requirements analysis of an intrusion detection system," Requirements Engineering, vol. volume 7, no. 4, pp. 207-220, 2002.
    • (2002) Requirements Engineering , vol.7 , Issue.4 , pp. 207-220
    • H., G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.