메뉴 건너뛰기




Volumn 4127 LNCS, Issue , 2006, Pages 119-132

Interactive analysis of attack graphs using relational queries

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; KNOWLEDGE BASED SYSTEMS; OPTIMIZATION; QUERY LANGUAGES; USER INTERFACES; ARTIFICIAL INTELLIGENCE; DECISION SUPPORT SYSTEMS; GRAPHIC METHODS; QUERY PROCESSING;

EID: 33746743758     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11805588_9     Document Type: Conference Paper
Times cited : (28)

References (21)
  • 6
    • 0013193905 scopus 로고
    • The COPS security checker system
    • D. Farmer and E.H. Spafford. The COPS security checker system. In USENIX Summer, pages 165-170, 1990.
    • (1990) USENIX Summer , pp. 165-170
    • Farmer, D.1    Spafford, E.H.2
  • 8
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • V. Kumar, J. Srivastava, and A. Lazarevic, editors. Kluwer Academic Publisher
    • S. Jajodia, S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publisher, 2003.
    • (2003) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 13
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Software Eng., 25(5):633-650, 1999.
    • (1999) IEEE Trans. Software Eng. , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 15
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • C.R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1/2):189-209, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 189-209
    • Ramakrishnan, C.R.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.