메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 75-84

A host-based approach to network attack chaining analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; GRAPH THEORY; MATHEMATICAL MODELS; SECURITY OF DATA; SOFTWARE PROTOTYPING;

EID: 33846269000     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.6     Document Type: Conference Paper
Times cited : (84)

References (25)
  • 2
    • 0038289826 scopus 로고
    • Kuang: Rule based security checking. Technical report, MIT Lab for Computer Science, Programming Systems Research Group
    • May
    • R. Baldwin. Kuang: Rule based security checking. Technical report, MIT Lab for Computer Science, Programming Systems Research Group, May 1994.
    • (1994)
    • Baldwin, R.1
  • 9
    • 0038628539 scopus 로고    scopus 로고
    • Minimization and reliability analysis of attack graphs
    • Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, February
    • S. Jha, O. Sheyner, and J. Wing. Minimization and reliability analysis of attack graphs. Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, February 2002.
    • (2002)
    • Jha, S.1    Sheyner, O.2    Wing, J.3
  • 21
    • 33646159797 scopus 로고    scopus 로고
    • Tools for generating and analyzing attack graphs
    • To appear in Proceedings of International Symposium on Formal Methods for Components and Objects
    • O. Sheyner and J. Wing. Tools for generating and analyzing attack graphs. In To appear in Proceedings of International Symposium on Formal Methods for Components and Objects, Lecture Notes in Computer Science, 2005.
    • (2005) Lecture Notes in Computer Science
    • Sheyner, O.1    Wing, J.2
  • 23
    • 0034593179 scopus 로고    scopus 로고
    • A requires/provides model for computer attacks
    • Cork, Ireland, September
    • S. Templeton and K. Levitt. A requires/provides model for computer attacks. In Proceedings of the New Security Paradigms Workshop, Cork, Ireland, September 2000. http://seclab.cs.ucdavis.edu/papers/NP2000-rev.pdf.
    • (2000) Proceedings of the New Security Paradigms Workshop
    • Templeton, S.1    Levitt, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.