메뉴 건너뛰기




Volumn 4219 LNCS, Issue , 2006, Pages 127-144

Ranking attack graphs

Author keywords

Attack graph; Attack model; Google pagerank; Model checking; Security metric

Indexed keywords

ALGORITHMS; APPROXIMATION THEORY; COMPUTER CRIME; COMPUTER SIMULATION; MATHEMATICAL MODELS; PROBABILITY; SECURITY OF DATA;

EID: 33750288536     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11856214_7     Document Type: Conference Paper
Times cited : (112)

References (25)
  • 8
    • 0038628539 scopus 로고    scopus 로고
    • Minimization and reliability analysis of attack graphs
    • Feb
    • S. Jha, O. Sheyner, and J. M. Wing. Minimization and reliability analysis of attack graphs. In CMU CS Technical Report, Feb 2002.
    • (2002) CMU CS Technical Report
    • Jha, S.1    Sheyner, O.2    Wing, J.M.3
  • 19
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Oct
    • R. Ortalo, Y. Deshwarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. In IEEE Transactions on Software Engineering, pages 633-650, Oct 1999.
    • (1999) IEEE Transactions on Software Engineering , pp. 633-650
    • Ortalo, R.1    Deshwarte, Y.2    Kaaniche, M.3
  • 24
    • 84941162000 scopus 로고
    • The methematical models of computer virus infection and methods of prevention
    • HF. Zhu, The methematical models of computer virus infection and methods of prevention. In Mini-Micro Systems (Journal of China Computer Society), pages Vol 11, No.7, 14-21, 1990.
    • (1990) Mini-micro Systems (Journal of China Computer Society) , vol.11 , Issue.7 , pp. 14-21
    • Zhu, H.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.