-
1
-
-
0036804084
-
Defending against flooding-based distributed denial of service attacks: A tutorial
-
Chang R. K. C.. Defending against flooding-based distributed denial of service attacks: A tutorial. IEEE Communications Magazine, 2002, 40(10): 42-51
-
(2005)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
2
-
-
0019608720
-
Formal models for computer security
-
Landwehr C.. Formal models for computer security. Computer Surveys, 1981, 13(3): 247-278
-
(1981)
Computer Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.1
-
4
-
-
4243931532
-
Probabilistic validation of intrusion tolerance
-
Washington, DC
-
Sanders W. H., Cukier M., Webber F., Pal P., Watro R.. Probabilistic validation of intrusion tolerance. In: Proceedings of International Conference on Dependable Systems and Networks (DSN-2002), Washington, DC, 2002, Supplemental Volume B-78-B-79
-
(2002)
Proceedings of International Conference on Dependable Systems and Networks (DSN-2002)
, vol.B-78-B-79
, Issue.SUPPL.
-
-
Sanders, W.H.1
Cukier, M.2
Webber, F.3
Pal, P.4
Watro, R.5
-
5
-
-
84974774507
-
Towards operational measures of computer security
-
Littlewood B., Brocklehurst S., Fenton N., Mellor P., Page S., Wright D.. Towards operational measures of computer security. Computer Security, 1993, 2(2/3): 211-230
-
(1993)
Computer Security
, vol.2
, Issue.2-3
, pp. 211-230
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
-
6
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Nicol D. M., Sanders W. H., Trivedi K. S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependability and Security, 2004, 1(1): 48-65
-
(2004)
IEEE Transactions on Dependability and Security
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
7
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis A., Laprie J. C., Randell B., Landwehr C.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11-33
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.C.2
Randell, B.3
Landwehr, C.4
-
8
-
-
84860434875
-
A structural framework for modeling multi-stage network attacks
-
Vancouver, BC, Canada
-
Daley K., Larson R., Dawkins J.. A structural framework for modeling multi-stage network attacks. In: Proceedings of ICPP Workshops, Vancouver, BC, Canada, 2002, 5-10
-
(2002)
Proceedings of ICPP Workshops
, pp. 5-10
-
-
Daley, K.1
Larson, R.2
Dawkins, J.3
-
9
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Berkeley, California, USA
-
Sheyner O., Hames J., Jha S., Lippmann R., Wing J.. Automated generation and analysis of attack graphs, In: Proceedings of 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 2002, 273-284
-
(2002)
Proceedings of 2002 IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Hames, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
10
-
-
84948760464
-
Two formal analyses of attack graphs
-
Nova Scotia, Canada
-
Jha S., Sheyner O., Wing J. M.. Two formal analyses of attack graphs. In: Proceedings of Computer Security Foundations Workshop (CSFW), Nova Scotia, Canada, 2002, 49-63
-
(2002)
Proceedings of Computer Security Foundations Workshop (CSFW)
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.M.3
-
12
-
-
84964504906
-
Computer-attack graph generation tool
-
Swiler L. P., Phillips C., Ellis D., Chakerian S.. Computer-attack graph generation tool. In: Proceedings of the DARPA Information Survivability Conference and Exposition II, Anaheim, CA, 2001, 307-321
-
(2001)
Proceedings of the DARPA Information Survivability Conference and Exposition II
, pp. 307-321
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
13
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo R., Deswarte Y., Kaaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5): 633-650
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
15
-
-
0003735470
-
Modeling checking for security protocols
-
Carnegie Mellon University: Technical Report CMU-SCS-97-139
-
Marrero W., Clark E., Jha S.. Modeling checking for security protocols. Carnegie Mellon University: Technical Report CMU-SCS-97-139, 1997
-
(1997)
-
-
Marrero, W.1
Clark, E.2
Jha, S.3
-
16
-
-
0034963556
-
Model checking security properties of control flow graphs
-
Besson F., Jensen J., Metayer D. L., Thorn T.. Model checking security properties of control flow graphs. Computer Security, 2001, 9(3): 217-250
-
(2001)
Computer Security
, vol.9
, Issue.3
, pp. 217-250
-
-
Besson, F.1
Jensen, J.2
Metayer, D.L.3
Thorn, T.4
-
17
-
-
0033718255
-
Using model checking to analyze network vulnerabilities
-
Oakland, California, USA
-
Ritchey R., Ammann P.. Using model checking to analyze network vulnerabilities. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, USA, 2000, 156-165
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 156-165
-
-
Ritchey, R.1
Ammann, P.2
-
18
-
-
0742317706
-
SITAR: Scalable intrusion tolerance architecture for distributed services
-
West Point, New York, USA
-
Wang F., Gong F., Sargor C., Goseva-Popstojanova K., Trivedi K. S., Jou F.. SITAR: Scalable intrusion tolerance architecture for distributed services. In: Proceedings of IEEE Second SMC Information Assurance Workshop, West Point, New York, USA, 2001, 38-45
-
(2001)
Proceedings of IEEE Second SMC Information Assurance Workshop
, pp. 38-45
-
-
Wang, F.1
Gong, F.2
Sargor, C.3
Goseva-Popstojanova, K.4
Trivedi, K.S.5
Jou, F.6
-
19
-
-
2642526260
-
Security analysis of SI-TAR intrusion-tolerant system
-
Fairfax, VA
-
Wang D., Madan B., Trivedi K. S.. Security analysis of SI-TAR intrusion-tolerant system. In: Proceedings of ACM Workshop Survivable and Self-Regenerative Systems, Fairfax, VA, 2003, 23-32
-
(2003)
Proceedings of ACM Workshop Survivable and Self-Regenerative Systems
, pp. 23-32
-
-
Wang, D.1
Madan, B.2
Trivedi, K.S.3
-
20
-
-
0036926468
-
Modeling and quantification of security attributes of software systems
-
Washington, DC, USA
-
Madan B., Goseva-Popstojanova K., Vaidyanathan K., Trivedi K. S.. Modeling and quantification of security attributes of software systems. In: Proceedings of International Conference on Dependable Systems and Networks, Washington, DC, USA, 2002, 505-514
-
(2002)
Proceedings of International Conference on Dependable Systems and Networks
, pp. 505-514
-
-
Madan, B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
21
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
Madan B., Goseva-Popstojanova K., Vaidyanathan K., Trivedi K. S.. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 2004, 56(1-4): 167-186
-
(2004)
Performance Evaluation
, vol.56
, Issue.1-4
, pp. 167-186
-
-
Madan, B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
23
-
-
16244408511
-
A general framework for network survivability quantification
-
Dresden, Germany
-
Liu Y., Trivedi K. S.. A general framework for network survivability quantification. In: Proceedings of the 12th GI/ITG Conf. Measuring, Modelling and Evaluation of Computer and Comm. Systems (MMB) together with Third Polish-German Teletraffic Symposium (PGTS), Dresden, Germany, 2004, 369-378
-
(2004)
Proceedings of the 12th GI/ITG Conf. Measuring, Modelling and Evaluation of Computer and Comm. Systems (MMB) together with Third Polish-German Teletraffic Symposium (PGTS)
, pp. 369-378
-
-
Liu, Y.1
Trivedi, K.S.2
-
24
-
-
0036983399
-
Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks
-
Atlanta
-
Chen D., Garg S., Trivedi K. S.. Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks. In: Proceedings of the 5th ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2002), Atlanta, 2002, 61-68
-
(2002)
Proceedings of the 5th ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2002)
, pp. 61-68
-
-
Chen, D.1
Garg, S.2
Trivedi, K.S.3
-
25
-
-
0034590196
-
Survivability analysis of network specifications
-
New York, USA
-
Jha S., Linger R., Longstaff T., Wing J.. Survivability analysis of network specifications. In: Proceedings of Workshop on Dependability Despite Malicious Faults. In: Proceedings of International Conference on Dependable Systems and Networks (DSN), New York, USA, 2000, 613-622
-
(2000)
Proceedings of Workshop on Dependability Despite Malicious Faults, Proceedings of International Conference on Dependable Systems and Networks (DSN)
, pp. 613-622
-
-
Jha, S.1
Linger, R.2
Longstaff, T.3
Wing, J.4
-
26
-
-
8844233022
-
Secure mobile agents for network vulnerability scanning
-
United States Military Academy, West Point, New York
-
Humphries J. W., Pooch U. W.. Secure mobile agents for network vulnerability scanning. In: Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, New York, 2000, 19-25
-
(2000)
Proceedings of the 2000 IEEE Workshop on Information Assurance and Security
, pp. 19-25
-
-
Humphries, J.W.1
Pooch, U.W.2
-
27
-
-
30544436159
-
A framework for network vulnerability analysis
-
St. Thomas, Virgin Islands, USA
-
Qu G., Jayaprakash, Ramkishore M., Hariri S., Raghavendra C. S.. A framework for network vulnerability analysis. In: Proceedings of the 1st IASTED International Conference on Communications, Internet, Information Technology (CIIT 2002), St. Thomas, Virgin Islands, USA, 2002, 289-298
-
(2002)
Proceedings of the 1st IASTED International Conference on Communications, Internet, Information Technology (CIIT 2002)
, pp. 289-298
-
-
Qu, G.1
Jayaprakash2
Ramkishore, M.3
Hariri, S.4
Raghavendra, C.S.5
-
28
-
-
0038226150
-
Attack modeling for information security and survivability
-
Carnegie Mellon University: Technical Note CMV/SEI-2001-TH-001
-
Moore A. P., Ellison R. J., Linger R. C.. Attack modeling for information security and survivability. Carnegie Mellon University: Technical Note CMV/SEI-2001-TH-001, 2001
-
(2001)
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
29
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson E., Olovsson T.. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 1997, 23(4): 235-245
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
31
-
-
1642529483
-
A kind of network security behavior model based on game theory
-
Chengdu, China
-
Xia Zheng-You, Zhang Shi-Yong. A kind of network security behavior model based on game theory. In: Proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT, Chengdu, China, 2003, 950-954
-
(2003)
Proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT
, pp. 950-954
-
-
Xia, Z.-Y.1
Zhang, S.-Y.2
-
32
-
-
3142596346
-
Fundamental concepts of dependability
-
Boston, MA
-
Avizenis A., Laprie J., Randell B.. Fundamental concepts of dependability. In: Proceedings of the 3rd Information Survivability Workshop, Boston, MA, 2000, 7-12
-
(2000)
Proceedings of the 3rd Information Survivability Workshop
, pp. 7-12
-
-
Avizenis, A.1
Laprie, J.2
Randell, B.3
-
33
-
-
84964425047
-
Characterizing intrusion tolerant systems using a state transition model
-
Goseva-Postojanova K., Wang F., Wang R., Gong F., Vaidyanathan K., Trivedi K. S., Muthusamy B.. Characterizing intrusion tolerant systems using a state transition model. In: Proceedings of DARPA DISCEX II Conference, 2001, II(2): 211-221
-
(2001)
Proceedings of DARPA DISCEX II Conference
, vol.2
, Issue.2
, pp. 211-221
-
-
Goseva-Postojanova, K.1
Wang, F.2
Wang, R.3
Gong, F.4
Vaidyanathan, K.5
Trivedi, K.S.6
Muthusamy, B.7
-
35
-
-
4243503824
-
Towards quantitative evaluation of computer security
-
Institute National Polytechnique de Toulouse, France
-
Dacier M.. Towards quantitative evaluation of computer security[Ph. D. dissertation]. Institute National Polytechnique de Toulouse, France, 1994
-
(1994)
-
-
Dacier, M.1
-
36
-
-
16244368460
-
Model-based validation of an intrusion-tolerant information system
-
Florianopolis, Brazil
-
Stevens F., Courtney T., Singh S., Agbaria A., Meyer J. F., Sanders W. H., Pal P.. Model-based validation of an intrusion-tolerant information system. In: Proceedings of the 23rd Symposium, on Reliable Distributed Systems (SRDS 2004), Florianopolis, Brazil, 2004, 184-194
-
(2004)
Proceedings of the 23rd Symposium, on Reliable Distributed Systems (SRDS 2004)
, pp. 184-194
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Meyer, J.F.5
Sanders, W.H.6
Pal, P.7
-
37
-
-
1542330099
-
Probabilistic validation of an intrusion-tolerant replication system
-
San Francisco, CA, USA
-
Singh S., Cukier M., Sanders W. H.. Probabilistic validation of an intrusion-tolerant replication system. In: Proceedings of the International Conference on Dependable Systems and Networks, San Francisco, CA, USA, 2003, 616-624
-
(2003)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 616-624
-
-
Singh, S.1
Cukier, M.2
Sanders, W.H.3
-
38
-
-
0142187705
-
Dependability and performance evaluation of intrusion-tolerant server architectures
-
Sao Paulo, Brazil
-
Gupta V., Lam V. V., Ramasamy H. V., Sanders W. H., Singh S.. Dependability and performance evaluation of intrusion-tolerant server architectures. In: Proceedings of the 1st Latin-Am. Symposium (LADC 2003), Sao Paulo, Brazil, 2003, 81-101
-
(2003)
Proceedings of the 1st Latin-Am. Symposium (LADC 2003)
, pp. 81-101
-
-
Gupta, V.1
Lam, V.V.2
Ramasamy, H.V.3
Sanders, W.H.4
Singh, S.5
-
40
-
-
21344479789
-
Exact and ordinary lumpability in finite Markov chains
-
Buchholz P.. Exact and ordinary lumpability in finite Markov chains. Applied Probability, 1994, 31: 59-74
-
(1994)
Applied Probability
, vol.31
, pp. 59-74
-
-
Buchholz, P.1
-
41
-
-
0034159340
-
Efficient computation of equivalent and reduced representations for stochastic automata
-
Buchholz P.. Efficient computation of equivalent and reduced representations for stochastic automata. Computer Systems Science and Engineering, 2000, 15(2): 93-103
-
(2000)
Computer Systems Science and Engineering
, vol.15
, Issue.2
, pp. 93-103
-
-
Buchholz, P.1
-
42
-
-
0022785652
-
An aggregation technique for the transient analysis of stiff Markov chains
-
Bobbio A., Trivedi K. S.. An aggregation technique for the transient analysis of stiff Markov chains. IEEE Transactions on Computers, 1986, 35(9): 803-814
-
(1986)
IEEE Transactions on Computers
, vol.35
, Issue.9
, pp. 803-814
-
-
Bobbio, A.1
Trivedi, K.S.2
-
43
-
-
12344263800
-
An approach for bounding reward measures in Markov models using aggregation
-
University of Illinois at Urbana-Champaign Coordinated Science Laboratory: Technical Report Italy, UILV-ENG-04-2206 (CRHC-04-06)
-
Daly D., Buchholz P., Sanders W. H.. An approach for bounding reward measures in Markov models using aggregation. University of Illinois at Urbana-Champaign Coordinated Science Laboratory: Technical Report Italy, UILV-ENG-04-2206 (CRHC-04-06), 2004
-
(2004)
-
-
Daly, D.1
Buchholz, P.2
Sanders, W.H.3
-
44
-
-
84903156410
-
Saturation: An efficient iteration strategy for symbolic state-space generation
-
Gevona, Italy
-
Ciardo G., Lüttgen G., Siminiceanu R.. Saturation: An efficient iteration strategy for symbolic state-space generation. In: Proceedings of International Conference Tools and Algorithms for the Construction and Analysis of Systems, Gevona, Italy, 2001, 328-342
-
(2001)
Proceedings of International Conference Tools and Algorithms for the Construction and Analysis of Systems
, pp. 328-342
-
-
Ciardo, G.1
Lüttgen, G.2
Siminiceanu, R.3
-
46
-
-
0345914604
-
An efficient disk-based tool for solving large Markov models
-
Deavours D. D., Sanders W. H.. An efficient disk-based tool for solving large Markov models. Performance Evaluation, 1998, 33(1): 67-84
-
(1998)
Performance Evaluation
, vol.33
, Issue.1
, pp. 67-84
-
-
Deavours, D.D.1
Sanders, W.H.2
-
47
-
-
16244370706
-
A structured path-based approach for computing transient rewards of large CT-MCs
-
Enschede, The Netherlands
-
Lam V. V., Buchholz P., Sanders W. H.. A structured path-based approach for computing transient rewards of large CT-MCs. In: Proceedings of the 1st International Conference Quantitative Evaluation of Systems (QEST), Enschede, The Netherlands, 2004, 136-145
-
(2004)
Proceedings of the 1st International Conference Quantitative Evaluation of Systems (QEST)
, pp. 136-145
-
-
Lam, V.V.1
Buchholz, P.2
Sanders, W.H.3
-
49
-
-
2542607810
-
Quantitative assessment of operational security: Models and tools
-
Laboratory for Analysis and Architecture of Systems: Technical Report 96493
-
Dacier M., Deswarte Y., Kaaniche M.. Quantitative assessment of operational security: Models and tools. Laboratory for Analysis and Architecture of Systems: Technical Report 96493, 1996
-
(1996)
-
-
Dacier, M.1
Deswarte, Y.2
Kaaniche, M.3
-
50
-
-
0016058662
-
Survivability analysis of command and control communications networks - Part I, II
-
Erank H.. Survivability analysis of command and control communications networks-part I, II. IEEE Transactions on Communications, 1974, 22(5): 589-605
-
(1974)
IEEE Transactions on Communications
, vol.22
, Issue.5
, pp. 589-605
-
-
Erank, H.1
-
51
-
-
0004266644
-
On the definition of Survivability
-
Department of Computer Science, University of Virginia: Technical Report CS-00-33
-
Knight J., Sullivan K.. On the definition of Survivability. Department of Computer Science, University of Virginia: Technical Report CS-00-33, 2000
-
(2000)
-
-
Knight, J.1
Sullivan, K.2
-
52
-
-
0028319421
-
A framework for characterizing disaster-based network Survivability
-
Liew S. C., Lu K. W.. A framework for characterizing disaster-based network Survivability. IEEE Journal on Selected Areas in Communications, 1994, 12(1): 52-58
-
(1994)
IEEE Journal on Selected Areas in Communications
, vol.12
, Issue.1
, pp. 52-58
-
-
Liew, S.C.1
Lu, K.W.2
-
53
-
-
16244421903
-
Technical report on enhanced network Survivability performance
-
T1A1.2 Working Group on Network Survivability Performance, Technical Report ANSI, T1. TR. 68
-
T1A1.2 Working Group on Network Survivability Performance, Technical report on enhanced network Survivability performance, Technical Report ANSI, T1. TR. 68, 2001
-
(2001)
-
-
-
54
-
-
20444411497
-
Research on trustworthy networks
-
Chinese source
-
Lin Chuang, Peng Xue-Hai. Research on trustworthy networks. Chinese Journal of Computers, 2005, 28(5): 751-758 (in Chinese)
-
(2005)
Chinese Journal of Computers
, vol.28
, Issue.5
, pp. 751-758
-
-
Lin, C.1
Peng, X.-H.2
-
55
-
-
84931382820
-
Design of fault-tolerant computers
-
Washington, DC
-
Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS, Washington, DC, 1967, 31: 733-743
-
(1968)
Proceedings of AFIPS
, vol.31
, pp. 733-743
-
-
Avizienis, A.1
|