메뉴 건너뛰기




Volumn 4166 LNCS, Issue , 2006, Pages 15-28

Through the description of attacks: A multidimensional view

Author keywords

Attack pattern; Security assessment

Indexed keywords

BOUNDARY CONDITIONS; COMPUTER CRIME; INFORMATION ANALYSIS; INTEGRATION; KNOWLEDGE BASED SYSTEMS; SECURITY OF DATA;

EID: 33750999336     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (19)
  • 2
    • 0003518833 scopus 로고
    • PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana
    • Kumar, S. : Classification and Detection of Computer Intrusions. PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana (1995).
    • (1995) Classification and Detection of Computer Intrusions
    • Kumar, S.1
  • 3
    • 0003531721 scopus 로고    scopus 로고
    • PhD thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania
    • Howard, J.: An Analysis of Security Incidents on the Internet, 19891995. PhD thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania (1997).
    • (1997) An Analysis of Security Incidents on the Internet, 19891995
    • Howard, J.1
  • 4
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher
    • S. Jajodia, S. Noel, B. O'Berry: Topological Analysis of Network Attack Vulnerability. In Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher (2004).
    • (2004) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 8
    • 33750973021 scopus 로고    scopus 로고
    • A framework for the security assessment of remote control applications of critical infrastructure
    • Ispra
    • Masera, M., Nai Fovino, I., & Sgnaolin, R.: A Framework for the Security Assessment of Remote Control Applications of Critical Infrastructure. ESReDA 29th Seminar, (2005) Ispra.
    • (2005) ESReDA 29th Seminar
    • Masera, M.1    Nai Fovino, I.2    Sgnaolin, R.3
  • 10
    • 26444516466 scopus 로고    scopus 로고
    • Security vulnerabilities in software systems: A quantitative perspective
    • Publisher: Springer-Verlag GmbH
    • Alhazmi, O., Malaiya, Y., & Ray, L: Security Vulnerabilities in Software Systems: A Quantitative Perspective. Lecture Notes in Computer Science, Volume 3654/2005. (2005) Publisher: Springer-Verlag GmbH.
    • (2005) Lecture Notes in Computer Science , vol.3654 , Issue.2005
    • Alhazmi, O.1    Malaiya, Y.2    Ray, L.3
  • 17
    • 0002670359 scopus 로고    scopus 로고
    • Modeling security threats
    • Schneier, B.: Modeling Security Threats, Dr. Dobb's Journal. https://www.schneier.com/paper-attacktrees-ddj-ft.html (2001).
    • (2001) Dr. Dobb's Journal
    • Schneier, B.1
  • 19
    • 33751006097 scopus 로고    scopus 로고
    • Modelling information assets for security risk assessment in industrial settings
    • Masera, M. & Nai Fovino, I.: Modelling Information Assets for Security Risk Assessment in Industrial settings. 15th EICAR Annual Conference (2006).
    • (2006) 15th EICAR Annual Conference
    • Masera, M.1    Nai Fovino, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.