-
1
-
-
27544480141
-
-
CERT/United States Secret Service/CSO, 2004.
-
2004 E-Crime Watch Survey: Summary Of Findings. CERT/United States Secret Service/CSO, 2004. http://www.cert.org/archive/pdf/ 2004eCrimeWatchSuramary. pdf.
-
2004 E-crime Watch Survey: Summary of Findings
-
-
-
3
-
-
0032058198
-
Proof verification and the hardness of approximation problems
-
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof Verification And The Hardness Of Approximation Problems. J. ACM, 45(3):501-555, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
4
-
-
0031651077
-
Probabilistic checking of proofs: A new characterization of NP
-
S. Arora and S. Safra. Probabilistic Checking Of Proofs: A New Characterization Of NP. J. ACM, 45(1):70-122, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.1
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
5
-
-
27544507919
-
On the hardness of approximating the Min-Hack problem
-
Computer Science and Engineering, SUNY at Buffalo.
-
R. Chinchani, D. Ha, A. Iyer, H. Q. Ngo, and S. Upadhyaya. On the hardness of approximating the Min-Hack problem. 2005. Technical Report 2005-05. Computer Science and Engineering, SUNY at Buffalo.
-
(2005)
Technical Report
, vol.2005
, Issue.5
-
-
Chinchani, R.1
Ha, D.2
Iyer, A.3
Ngo, H.Q.4
Upadhyaya, S.5
-
7
-
-
2642519111
-
Privilege graph: An extension to the typed access matrix model
-
M. Dacier and Y. Deswarte. Privilege graph: an extension to the typed access matrix model. In ESORICS, pages 319-334, 1994.
-
(1994)
ESORICS
, pp. 319-334
-
-
Dacier, M.1
Deswarte, Y.2
-
9
-
-
0030100766
-
Interactive proofs and the hardness of approximating cliques
-
U. Feige, S. Goldwasser, L. Lovász, S. Safra, and M. Szegedy. Interactive Proofs And The Hardness Of Approximating Cliques. J. ACM, 43(2):268-292, 1996.
-
(1996)
J. ACM
, vol.43
, Issue.2
, pp. 268-292
-
-
Feige, U.1
Goldwasser, S.2
Lovász, L.3
Safra, S.4
Szegedy, M.5
-
10
-
-
0004127488
-
-
W. H. Freeman and Co., San Francisco, Calif., A Guide To The Theory Of NP-Completeness, A Series of Books in the Mathematical Sciences.
-
M. R. Garey and D. S. Johnson. Computers and Intractability. W. H. Freeman and Co., San Francisco, Calif., 1979. A Guide To The Theory Of NP-Completeness, A Series of Books in the Mathematical Sciences.
-
(1979)
Computers and Intractability.
-
-
Garey, M.R.1
Johnson, D.S.2
-
12
-
-
27544461231
-
Some recent strong inapproximability results
-
Algorithm theory - SWAT'98 (Stockholm) Springer, Berlin
-
J. Håstad. Some Recent Strong Inapproximability Results. In Algorithm theory - SWAT'98 (Stockholm), volume 1432 of Lecture Notes in Comput. Sci., pages 205-209. Springer, Berlin, 1998.
-
(1998)
Lecture Notes in Comput. Sci.
, vol.1432
, pp. 205-209
-
-
Håstad, J.1
-
13
-
-
0030671781
-
Some optimal inapproximability results
-
(electronic). ACM, New York
-
J. Håstad. Some Optimal Inapproximability Results. In STOC '97 (El Paso, TX), pages 1-10 (electronic). ACM, New York, 1999.
-
(1999)
STOC '97 (El Paso, TX)
, pp. 1-10
-
-
Håstad, J.1
-
15
-
-
0032057911
-
On syntactic versus computational views of approximability
-
(electronic)
-
S. Khanna, R. Motwani, M. Sudan, and U. Vazirani. On Syntactic Versus Computational Views Of Approximability. SIAM J. Comput., 28(1):164-191 (electronic), 1999.
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.1
, pp. 164-191
-
-
Khanna, S.1
Motwani, R.2
Sudan, M.3
Vazirani, U.4
-
17
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operation security
-
September/October
-
R. Ortalo, Y. Dewarte, and M. Kaaniche. Experimenting With Quantitative Evaluation Tools For Monitoring Operation Security. IEEE Transactions on Software Engineering, 25(5):633-650, September/October 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Dewarte, Y.2
Kaaniche, M.3
-
18
-
-
0026366408
-
Optimization, approximation, and complexity classes
-
C. H. Papadimitriou and M. Yannakakis. Optimization, Approximation, And Complexity Classes. J. Comput. System Sci., 43(3):425-440, 1991.
-
(1991)
J. Comput. System Sci.
, vol.43
, Issue.3
, pp. 425-440
-
-
Papadimitriou, C.H.1
Yannakakis, M.2
-
20
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
Oakland, CA., May
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated Generation and Analysis of Attack Graphs. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA., May 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
21
-
-
84964504906
-
Computer-attack graph generation tool
-
June
-
L. P. Swiler, C. Phillips, D. Ellis, and S. Chakerian. Computer-Attack Graph Generation Tool. In DARPA Information Survivability Conference and Exposition (DISCEX 11'01), volume 2, June 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX 11'01)
, vol.2
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
|