-
1
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), pages 217-224, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02)
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
6
-
-
0013193905
-
The COPS security checker system
-
D. Farmer and E.H. Spafford. The COPS security checker system. In USENIX Summer, pages 165-170, 1990.
-
(1990)
USENIX Summer
, pp. 165-170
-
-
Farmer, D.1
Spafford, E.H.2
-
7
-
-
21744433274
-
Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals
-
J. Gray, A. Bosworth, A. Bosworth, A. Layman, D. Reichart, M. Venkatrao, F. Pellow, and H. Pirahesh. Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals. Data Mining and Knowledge Discovery, 1(1):29-53, 1997.
-
(1997)
Data Mining and Knowledge Discovery
, vol.1
, Issue.1
, pp. 29-53
-
-
Gray, J.1
Bosworth, A.2
Bosworth, A.3
Layman, A.4
Reichart, D.5
Venkatrao, M.6
Pellow, F.7
Pirahesh, H.8
-
8
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
V. Kumar, J. Srivastava, and A. Lazarevic, editors. Kluwer Academic Publisher
-
S. Jajodia, S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publisher, 2003.
-
(2003)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
13
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Software Eng., 25(5):633-650, 1999.
-
(1999)
IEEE Trans. Software Eng.
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
15
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
C.R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1/2):189-209, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 189-209
-
-
Ramakrishnan, C.R.1
Sekar, R.2
-
18
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P'02), pages 273-284, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P'02)
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
20
-
-
33646042272
-
An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts
-
L. Wang, A. Liu, and S. Jajodia. An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts. In Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 2005), pages 247-266, 2005.
-
(2005)
Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 2005)
, pp. 247-266
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
|