-
2
-
-
0003518833
-
-
PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana
-
Kumar, S. : Classification and Detection of Computer Intrusions. PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana (1995).
-
(1995)
Classification and Detection of Computer Intrusions
-
-
Kumar, S.1
-
3
-
-
0003531721
-
-
PhD thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania
-
Howard, J.: An Analysis of Security Incidents on the Internet, 19891995. PhD thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania (1997).
-
(1997)
An Analysis of Security Incidents on the Internet, 19891995
-
-
Howard, J.1
-
4
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher
-
S. Jajodia, S. Noel, B. O'Berry: Topological Analysis of Network Attack Vulnerability. In Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher (2004).
-
(2004)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
8
-
-
33750973021
-
A framework for the security assessment of remote control applications of critical infrastructure
-
Ispra
-
Masera, M., Nai Fovino, I., & Sgnaolin, R.: A Framework for the Security Assessment of Remote Control Applications of Critical Infrastructure. ESReDA 29th Seminar, (2005) Ispra.
-
(2005)
ESReDA 29th Seminar
-
-
Masera, M.1
Nai Fovino, I.2
Sgnaolin, R.3
-
10
-
-
26444516466
-
Security vulnerabilities in software systems: A quantitative perspective
-
Publisher: Springer-Verlag GmbH
-
Alhazmi, O., Malaiya, Y., & Ray, L: Security Vulnerabilities in Software Systems: A Quantitative Perspective. Lecture Notes in Computer Science, Volume 3654/2005. (2005) Publisher: Springer-Verlag GmbH.
-
(2005)
Lecture Notes in Computer Science
, vol.3654
, Issue.2005
-
-
Alhazmi, O.1
Malaiya, Y.2
Ray, L.3
-
14
-
-
2642540118
-
Modeling Internet attacks
-
United States Military Academy, West Point, NY
-
Tidwell, T., Larson. R., Fitch, K. & Hale, J.: Modeling Internet Attacks. Proceeding of the 2001 IEEE Workshop on Information Assurance and Security. United States Military Academy, West Point, NY (2001).
-
(2001)
Proceeding of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Tidwell, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
-
16
-
-
0142049813
-
A software fault tree approach to requirements analysis of an intrusion detection system
-
Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L., and Lutz, R.: A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. In Proceedings of the first Symposium on Requirements Engineering for Information Security (2001).
-
(2001)
Proceedings of the First Symposium on Requirements Engineering for Information Security
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
-
17
-
-
0002670359
-
Modeling security threats
-
Schneier, B.: Modeling Security Threats, Dr. Dobb's Journal. https://www.schneier.com/paper-attacktrees-ddj-ft.html (2001).
-
(2001)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
18
-
-
84860434875
-
A structural framework for modeling multi-stage network attacks
-
Daley, K., Larson, R., & Dawkins, J.: A Structural Framework for Modeling Multi-stage Network Attacks. Proceedings of the International Conference on Parallel Processing Workshops. ICPP Workshops (2002), pp. 5-10.
-
(2002)
Proceedings of the International Conference on Parallel Processing Workshops. ICPP Workshops
, pp. 5-10
-
-
Daley, K.1
Larson, R.2
Dawkins, J.3
-
19
-
-
33751006097
-
Modelling information assets for security risk assessment in industrial settings
-
Masera, M. & Nai Fovino, I.: Modelling Information Assets for Security Risk Assessment in Industrial settings. 15th EICAR Annual Conference (2006).
-
(2006)
15th EICAR Annual Conference
-
-
Masera, M.1
Nai Fovino, I.2
|