메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 156-163

Towards a stochastic model for integrated security and dependability evaluation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; MARKOV PROCESSES; MATHEMATICAL MODELS; PROBABILITY; RANDOM PROCESSES; SECURITY SYSTEMS;

EID: 33750944742     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2006.137     Document Type: Conference Paper
Times cited : (33)

References (19)
  • 1
    • 33750939096 scopus 로고    scopus 로고
    • The development of a meaningful hacker taxonomy: A two dimensional approach
    • Technical report
    • The development of a meaningful hacker taxonomy: A two dimensional approach. Technical report, CERIAS Tech Report 2005-43, 2005.
    • (2005) CERIAS Tech Report , vol.2005 , Issue.43
  • 3
    • 1042277255 scopus 로고    scopus 로고
    • A method for modeling and quantifying the security attributes of intrusion tolerant systems
    • K. B. B. Madan, K. Vaidyanathan Goseva-Popstojanova, and K. S. Trivedi. A method for modeling and quantifying the security attributes of intrusion tolerant systems. In Performance Evaluation, volume 56, 2004.
    • (2004) Performance Evaluation , vol.56
    • Madan, K.B.B.1    Goseva-Popstojanova, K.V.2    Trivedi, K.S.3
  • 4
    • 0014873273 scopus 로고
    • Markov approach to finding failure times of repairable systems
    • November
    • John A. Buzacott. Markov approach to finding failure times of repairable systems. IEEE Transactions on Reliability, R-19:128-134, November 1970.
    • (1970) IEEE Transactions on Reliability , vol.R-19 , pp. 128-134
    • Buzacott, J.A.1
  • 8
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • April
    • E. Jonsson and T. Olovsson. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Eng., 4(25):235, April 1997.
    • (1997) IEEE Trans. Software Eng. , vol.4 , Issue.25 , pp. 235
    • Jonsson, E.1    Olovsson, T.2
  • 14
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Sept/Oct
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25(5):633-650, Sept/Oct 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 15
    • 0004260006 scopus 로고    scopus 로고
    • Academic Press, 3rd edition
    • G. Owen. Game Theory. Academic Press, 3rd edition, 2001.
    • (2001) Game Theory
    • Owen, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.