-
1
-
-
0026114683
-
Some properties of the bilevel programming problem
-
Bard, J.F., "Some Properties of the Bilevel Programming Problem," Journal of Optimization Theory and Applications, 68:2, 1991, 371-378.
-
(1991)
Journal of Optimization Theory and Applications
, vol.68
, Issue.2
, pp. 371-378
-
-
Bard, J.F.1
-
2
-
-
33749627458
-
-
Report SAND2004-0742, Sandia National Laboratories, Albuquerque, NM
-
Carlson, R.E., Turnquist, M.A. and Nozick, L.K., Expected Losses, Insurability and Benefits from Reducing Vulnerability to Attacks, Report SAND2004-0742, Sandia National Laboratories, Albuquerque, NM, 2004.
-
(2004)
Expected Losses, Insurability and Benefits from Reducing Vulnerability to Attacks
-
-
Carlson, R.E.1
Turnquist, M.A.2
Nozick, L.K.3
-
4
-
-
84948760464
-
Two formal analyses of attack graphs
-
June, Cape Breton, NS, Canada
-
Jha, S., Sheyner, O., and Wing, J.M. "Two Formal Analyses of Attack Graphs," 15th IEEE Computer Security Foundations Workshop, June 2002, Cape Breton, NS, Canada, 49-63.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.M.3
-
5
-
-
33749616730
-
-
Report SAND2005-xxxx,Sandia National Laboratories, Albuquerque, NM
-
Jones, D.A., Turnquist, M.A. and Nozick, L.K., Physical Security and Vulnerability Modeling for Infrastructure Facilities, Report SAND2005-xxxx,Sandia National Laboratories, Albuquerque, NM, 2005.
-
(2005)
Physical Security and Vulnerability Modeling for Infrastructure Facilities
-
-
Jones, D.A.1
Turnquist, M.A.2
Nozick, L.K.3
-
6
-
-
33749626773
-
Attack modelling in open network environments
-
Katsikas, S.K., Gritzalis, D., and Spirakis, P., "Attack Modelling in Open Network Environments," Communications and Multimedia Security II, 1996, 268-277.
-
(1996)
Communications and Multimedia Security II
, pp. 268-277
-
-
Katsikas, S.K.1
Gritzalis, D.2
Spirakis, P.3
-
7
-
-
0030073977
-
Model for network behaviour under viral attack
-
Katsikas, S.K., Spyrou, T., Gritzalis, D., and Darzentas, J., "Model for Network Behaviour under Viral Attack," Computer Communications, 19:2, 1996, 124-132.
-
(1996)
Computer Communications
, vol.19
, Issue.2
, pp. 124-132
-
-
Katsikas, S.K.1
Spyrou, T.2
Gritzalis, D.3
Darzentas, J.4
-
8
-
-
84969506768
-
Applications of Hidden Markov models to detecting multi-stage network attacks
-
IEEE Computer Society, Hawaii, CD-ROM
-
th Hawaii International Conference on Systems Science, IEEE Computer Society, Hawaii, 2003, CD-ROM, 10p.
-
(2003)
th Hawaii International Conference on Systems Science
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
9
-
-
3042575523
-
Coordinated internet attacks: Responding to attack complexity
-
Ourston, D., Matzner, S., Stump, W., and Hopkins, B. "Coordinated Internet Attacks: Responding to Attack Complexity," Journal of Computer Security, 12:2, 2004, 165-190.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
, pp. 165-190
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
10
-
-
84988504967
-
A graph-based system for network vulnerability analysis
-
Association for Computing Machinery
-
Phillips, C.A., and Swiler, L.P., "A Graph-Based System for Network Vulnerability Analysis," Proceedings of the 1998 New Security Paradigms Workshop, Association for Computing Machinery, 1998, 71-81.
-
(1998)
Proceedings of the 1998 New Security Paradigms Workshop
, pp. 71-81
-
-
Phillips, C.A.1
Swiler, L.P.2
-
13
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Berkeley, CA, May
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., and Wing, J.M., "Automated Generation and Analysis of Attack Graphs," Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Berkeley, CA, May 2002, 273-284.
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
14
-
-
0029546542
-
Setting optimal intrusion-detection thresholds
-
Soh, B.C., and Dillon, T.S. "Setting Optimal Intrusion-Detection Thresholds," Computers & Security, 14:7, 1995, 621-631.
-
(1995)
Computers & Security
, vol.14
, Issue.7
, pp. 621-631
-
-
Soh, B.C.1
Dillon, T.S.2
-
15
-
-
84964504906
-
Computer attack graph generation tool
-
Swiler, L.P., Phillips, C.A., Ellis, D., and Chakerian, S., "Computer Attack Graph Generation Tool," Proceedings of the 2nd DARPA Information Survivability Conference and Exposition, 2001, 307-321.
-
(2001)
Proceedings of the 2nd DARPA Information Survivability Conference and Exposition
, pp. 307-321
-
-
Swiler, L.P.1
Phillips, C.A.2
Ellis, D.3
Chakerian, S.4
-
16
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Warrender, C., Forrest, S. and Pearlmutter, B. "Detecting Intrusions Using System Calls: Alternative Data Models," Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999, 133-145.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|