-
1
-
-
33749620156
-
STAT scanner
-
STAT scanner. 2004. Available from: http://www.stat.harris.com/solutions/vuln_assess/scanner_index.asp
-
(2004)
-
-
-
4
-
-
84968652680
-
Attack trees
-
Schneier, B. 1999. Attack trees. Dr. Dobb's Journal 24 (12): 21-29.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
5
-
-
84867339043
-
Alert correlation in a cooperative intrusion detection framework
-
Los Alamitos, CA: IEEE Computer Society Press.
-
Cuppens, F., and A. Miege. 2002. Alert correlation in a cooperative intrusion detection framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, 187-200. Los Alamitos, CA: IEEE Computer Society Press.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 187-200
-
-
Cuppens, F.1
Miege, A.2
-
7
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
New York: ACM Press.
-
Ammann, P., D. Wijesekera, and S. Kaushik. 2002. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, edited by V. Alturi, 217-224. New York: ACM Press.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
Alturi, V.4
-
8
-
-
84948760464
-
Two formal analyses of attack graphs
-
LosAlamitos, CA: IEEE Computer Society Press.
-
Jha, S., O. Sheyner, and J. M. Wing. 2002. Two formal analyses of attack graphs. In Proceedings of the 15th IEEE Computer SecurityFoundationsWorkshop, 49-63. LosAlamitos, CA: IEEE Computer Society Press.
-
(2002)
Proceedings of the 15th IEEE Computer SecurityFoundationsWorkshop
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.M.3
-
10
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
LosAlamitos, CA: IEEE Computer Society Press.
-
Sheyner, O., J. Haines, S. Jha, R. Lippmann, and J. M. Wing. 2002. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, 254-265. LosAlamitos, CA: IEEE Computer Society Press.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 254-265
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
11
-
-
84964504906
-
Computer-attack graph generation tool
-
Los Alamitos, CA: IEEE Computer Society Press.
-
Swiler, L. P., C. Phillips, D. Ellis, and S. Chakerian. 2001. Computer-attack graph generation tool. In Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 2, 1307-1321. Los Alamitos, CA: IEEE Computer Society Press.
-
(2001)
Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 1307-1321
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
12
-
-
1042267106
-
-
Report SAND97-3010/1, Sandia National Laboratories Albuquerque, NM
-
Swiler, L. P., C. Phillips, and T. Gaylor. 1998. A graph-based network-vulnerability analysis system. Report SAND97-3010/1, Sandia National Laboratories, Albuquerque, NM.
-
(1998)
A graph-based network-vulnerability analysis system
-
-
Swiler, L.P.1
Phillips, C.2
Gaylor, T.3
-
13
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
Boston: Kluwer
-
Jajodia, S., S. Noel, and B. O’Berry. 2003. Topological analysis of network attack vulnerability. In Managing cyber threats: Issues, approaches and challenges, edited by V. Kumar, J. Srivastava, and A. Lazarevic. Boston: Kluwer.
-
(2003)
Managing cyber threats: Issues, approaches and challenges
-
-
Jajodia, S.1
Noel, S.2
B. O’Berry3
Kumar, V.4
Srivastava, J.5
Lazarevic, A.6
-
14
-
-
84860495162
-
Modeling multistep cyber attacks for scenario recognition
-
Los Alamitos, CA: IEEE Computer Society Press.
-
Cheung, S., U. Lindqvist, and M. W. Fong. 2003. Modeling multistep cyber attacks for scenario recognition. In Proceedings of the DARPA Information Survivability Conference and Exposition, 284-292. Los Alamitos, CA: IEEE Computer Society Press.
-
(2003)
Proceedings of the DARPA Information Survivability Conference and Exposition
, pp. 284-292
-
-
Cheung, S.1
Lindqvist, U.2
Fong, M.W.3
-
15
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
Ramakrishnan, C. R., and R. Sekar. 2002. Model-based analysis of configuration vulnerabilities. Journal of Computer Security 10 (1-2): 189-209.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 189-209
-
-
Ramakrishnan, C.R.1
Sekar, R.2
-
16
-
-
33745463192
-
Building simplified exploitation graphs for a cluster computing environment
-
Los Alamitos, CA: IEEE Computer Society Press.
-
Li, W., and R. B. Vaughn. 2005. Building simplified exploitation graphs for a cluster computing environment. In Proceedings of the 6th IEEE Information Assurance Workshop, 50-57. Los Alamitos, CA: IEEE Computer Society Press.
-
(2005)
Proceedings of the 6th IEEE Information Assurance Workshop
, pp. 50-57
-
-
Li, W.1
Vaughn, R.B.2
-
17
-
-
33744457628
-
Common Vulnerability Exposures
-
Common Vulnerability Exposures. 2004. Available from: http://cve.mitre.org/
-
(2004)
-
-
-
18
-
-
0003450426
-
-
Berlin: Springer-Verlag
-
Bérard, B., M. Bidoit, A. Finkel, F. Laroussinie, A. Petit, L. Petrucci, and P. Schnoebelen. 2001. Systems and software verification: Model-checking techniques and tools. Berlin: Springer-Verlag.
-
(2001)
Systems and software verification: Model-checking techniques and tools
-
-
Bérard, B.1
Bidoit, M.2
Finkel, A.3
Laroussinie, F.4
Petit, A.5
Petrucci, L.6
Schnoebelen, P.7
-
22
-
-
27544454296
-
An access control model for securecluster-computingenvironments
-
Proceedingsofthe38th Hawaii International Conference on System Sciences Los Alamitos, CA: IEEE Computer Society Press. Full paper available on proceedings CD.
-
Li, W., and E. B. Allen. 2005. An access control model for securecluster-computingenvironments. In Proceedingsofthe38th Hawaii International Conference on System Sciences, 309-310. Los Alamitos, CA: IEEE Computer Society Press. Full paper available on proceedings CD.
-
(2005)
, pp. 309-310
-
-
Li, W.1
Allen, E.B.2
-
23
-
-
84993793422
-
BugtraqVulnerabilitiesArchive
-
BugtraqVulnerabilitiesArchive.2004.Availablefrom:http://www.securityfocus.com/bid
-
(2004)
-
-
-
24
-
-
84993794237
-
CERT® Advisories
-
CERT® Advisories. 2004. Available from: http://www.cert.org/advisories
-
(2004)
-
-
-
25
-
-
84879638397
-
National Vulnerability Database
-
National Vulnerability Database. 2005. Available from: http://nvd.nist.gov/
-
(2005)
-
-
-
26
-
-
84858888235
-
SANS Top 20 Vulnerabilities
-
SANS Top 20 Vulnerabilities. 2004. Available from: http://www.sans.org/top20/
-
(2004)
-
-
-
27
-
-
33749612332
-
An approach to graph-based modeling of network exploitations
-
PhD diss., Department of Computer Science, Mississippi State University
-
Li, W. 2005.An approach to graph-based modeling of network exploitations. PhD diss., Department of Computer Science, Mississippi State University.
-
(2005)
-
-
Li, W.1
-
28
-
-
51149114808
-
Graphviz
-
Graphviz. 2004. Available from: http://www.research.att.com/sw/tools/graphviz/
-
(2004)
-
-
-
29
-
-
27744583699
-
ICAT Metabase
-
ICAT Metabase. 2004.Available from: http://icat.nist.gov/icat.cfm
-
(2004)
-
-
-
30
-
-
0003518833
-
Classification and detection of computer intrusions
-
PhD diss., Department of Computer Science, Purdue University, West Lafayette, IN.
-
Kumar, S. 1995. Classification and detection of computer intrusions. PhD diss., Department of Computer Science, Purdue University, West Lafayette, IN.
-
(1995)
-
-
Kumar, S.1
-
31
-
-
0141462933
-
Attack development for intrusion detection evaluation
-
Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
-
Das, K. J. 2000. Attack development for intrusion detection evaluation. Master's thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
-
(2000)
-
-
Das, K.J.1
-
34
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo, R., Y. Deswarte, and M. Kaaniche. 1999. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25 (5): 633-665.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-665
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
|