-
1
-
-
33750939096
-
The development of a meaningful hacker taxonomy: A two dimensional approach
-
Technical report
-
The development of a meaningful hacker taxonomy: A two dimensional approach. Technical report, CERIAS Tech Report 2005-43, 2005.
-
(2005)
CERIAS Tech Report
, vol.2005
, Issue.43
-
-
-
2
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
January-March
-
Algirdas Avizienis, Jean-Claude Laprie, Brian Randell, and Carl Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1:11-33, January-March 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
3
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
K. B. B. Madan, K. Vaidyanathan Goseva-Popstojanova, and K. S. Trivedi. A method for modeling and quantifying the security attributes of intrusion tolerant systems. In Performance Evaluation, volume 56, 2004.
-
(2004)
Performance Evaluation
, vol.56
-
-
Madan, K.B.B.1
Goseva-Popstojanova, K.V.2
Trivedi, K.S.3
-
4
-
-
0014873273
-
Markov approach to finding failure times of repairable systems
-
November
-
John A. Buzacott. Markov approach to finding failure times of repairable systems. IEEE Transactions on Reliability, R-19:128-134, November 1970.
-
(1970)
IEEE Transactions on Reliability
, vol.R-19
, pp. 128-134
-
-
Buzacott, J.A.1
-
8
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
April
-
E. Jonsson and T. Olovsson. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Eng., 4(25):235, April 1997.
-
(1997)
IEEE Trans. Software Eng.
, vol.4
, Issue.25
, pp. 235
-
-
Jonsson, E.1
Olovsson, T.2
-
10
-
-
84974774507
-
Towards operational measures of computer security
-
Oct
-
B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, McDermid J., and D. Gollmann. Towards operational measures of computer security. Journal of Computer Security, 2:211-229, Oct 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 211-229
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Gollmann, D.9
-
14
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Sept/Oct
-
R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25(5):633-650, Sept/Oct 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
15
-
-
0004260006
-
-
Academic Press, 3rd edition
-
G. Owen. Game Theory. Academic Press, 3rd edition, 2001.
-
(2001)
Game Theory
-
-
Owen, G.1
-
19
-
-
16244368460
-
Model-based validation of an intrusion-tolerant information system
-
Oct 18-20
-
F. Stevens, T. Courtney, S. Singh, A. Agbaria, J. F. Meyer, W. H. Sanders, and P. Pal. Model-based validation of an intrusion-tolerant information system. In Proceedings of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004), Oct 18-20 2004.
-
(2004)
Proceedings of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004)
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Meyer, J.F.5
Sanders, W.H.6
Pal, P.7
|