-
1
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Carnegie Mellon, SEI, Technical Report: CMU/SEI-99-TR-G28
-
Allen J., Christie A., Fithen W. et al. State of the practice of intrusion detection technologies. Carnegie Mellon, SEI, Technical Report: CMU/SEI-99-TR-G28, 2000.
-
(2000)
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
-
3
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson E., Olovsson T.. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 1997, 23(4): 235-245.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
4
-
-
84964425047
-
Characterizing intrusion tolerant systems using a state transition model
-
Gong F., Goseva-Popstojanova K., Wang F., Wang R., Vaid-yanathan K., Trivedi K., Muthusamy B.. Characterizing intrusion tolerant systems using a state transition model. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX II), 2001, 2: 211-221.
-
(2001)
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX II)
, vol.2
, pp. 211-221
-
-
Gong, F.1
Goseva-Popstojanova, K.2
Wang, F.3
Wang, R.4
Vaid-Yanathan, K.5
Trivedi, K.6
Muthusamy, B.7
-
6
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo R., Deswarte Y., Kaaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5): 633-650.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
7
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Oakland, USA
-
Sheyner O., Haines J., Jha S., Iippmann R., Wing J. M.. Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, 2002, 273-284.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Iippmann, R.4
Wing, J.M.5
-
8
-
-
33749456529
-
Modeling SITAR system security
-
Denver, USA, C-2 Fast Abstracts
-
Wang D. Z., Madan B. B., Trivedi K. S.. Modeling SITAR system security. In: Proceedings of the 14th IEEE International Symposium on Software Reliability Engineering, 2003, Denver, USA, C-2 Fast Abstracts.
-
(2003)
Proceedings of the 14th IEEE International Symposium on Software Reliability Engineering
-
-
Wang, D.Z.1
Madan, B.B.2
Trivedi, K.S.3
-
9
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
Madan B. B., Goseva-Popstojanova K., Vaidyanathan K., Trivedi K. S.. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 2004, 56(1-4). 167-186.
-
(2004)
Performance Evaluation
, vol.56
, Issue.1-4
, pp. 167-186
-
-
Madan, B.B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
12
-
-
0027557226
-
Sensitivity analyses of continuous and discrete systems in the time and frequency domains
-
Karnavas W. J., Sanchez P., Bahill A. T.. Sensitivity analyses of continuous and discrete systems in the time and frequency domains. IEEE Transactions on Systems, Man and Cybernetics, 1993, 23(2): 488-501.
-
(1993)
IEEE Transactions on Systems, Man and Cybernetics
, vol.23
, Issue.2
, pp. 488-501
-
-
Karnavas, W.J.1
Sanchez, P.2
Bahill, A.T.3
|