-
1
-
-
0038687692
-
Scalable graph-based vulnerability analysis
-
Washington, DC, November
-
P. Ammann, D. Wijesekera, and S. Kaushik. Scalable graph-based vulnerability analysis. In Proceedings CCS 2002: 9th ACM Conference on Computer and Commuincations Security, pages 217-224, Washington, DC, November 2002.
-
(2002)
Proceedings CCS 2002: 9th ACM Conference on Computer and Commuincations Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
2
-
-
0038289826
-
Kuang: Rule based security checking. Technical report, MIT Lab for Computer Science, Programming Systems Research Group
-
May
-
R. Baldwin. Kuang: Rule based security checking. Technical report, MIT Lab for Computer Science, Programming Systems Research Group, May 1994.
-
(1994)
-
-
Baldwin, R.1
-
6
-
-
20444475398
-
Modeling network attacks: Extending the attack tree paradigm
-
Johns Hopkins University, June, Center for Information Security, University of Tulsa
-
J. Dawkins, C. Campbell, and J. Hale. Modeling network attacks: Extending the attack tree paradigm. In Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University, June 2002. Center for Information Security, University of Tulsa.
-
(2002)
Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection
-
-
Dawkins, J.1
Campbell, C.2
Hale, J.3
-
9
-
-
0038628539
-
Minimization and reliability analysis of attack graphs
-
Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, February
-
S. Jha, O. Sheyner, and J. Wing. Minimization and reliability analysis of attack graphs. Technical Report CMU-CS-02-109, School of Computer Science, Carnegie Mellon University, February 2002.
-
(2002)
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
10
-
-
84948760464
-
Two formal analyses of attack graphs
-
Nova Scotia, June
-
S. Jha, O. Sheyner, and J. Wing. Two formal analyses of attack graphs. In Proceedings of the 2002 Computer Security Foundations Workshop, pages 49-63, Nova Scotia, June 2002.
-
(2002)
Proceedings of the 2002 Computer Security Foundations Workshop
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
13
-
-
0038011185
-
Constructing attack scenarios through correlation of intrustion alerts
-
Washington D.C, November
-
P. Ning, Y. Cui, and D. Reeves. Constructing attack scenarios through correlation of intrustion alerts. In Proceedings of the 9th ACM Conference on Computer & Communications Security, pages 245-254, Washington D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer & Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.3
-
14
-
-
79958186026
-
Building attack scenarios through integration of complementary alert correlation methods
-
February
-
P. Ning, D. Xu, C. Healey, and R. S. Amant. Building attack scenarios through integration of complementary alert correlation methods. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), pages 97-111, February 2004.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04)
, pp. 97-111
-
-
Ning, P.1
Xu, D.2
Healey, C.3
Amant, R.S.4
-
15
-
-
84944727025
-
Efficient minimum-cost network hardening via exploit dependency graphs
-
Las Vegas, December
-
S. Noel, S. Jajodia, B. O'Berry, and M. Jacobs. Efficient minimum-cost network hardening via exploit dependency graphs. In Proceedings ACSAC 2003: 19th Annual Computer Security Applications Conference, pages 86-95, Las Vegas, December 2003.
-
(2003)
Proceedings ACSAC 2003: 19th Annual Computer Security Applications Conference
, pp. 86-95
-
-
Noel, S.1
Jajodia, S.2
O'Berry, B.3
Jacobs, M.4
-
20
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
Oakland, CA, May
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (Oakland 2002), pages 254-265, Oakland, CA, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy (Oakland 2002)
, pp. 254-265
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
21
-
-
33646159797
-
Tools for generating and analyzing attack graphs
-
To appear in Proceedings of International Symposium on Formal Methods for Components and Objects
-
O. Sheyner and J. Wing. Tools for generating and analyzing attack graphs. In To appear in Proceedings of International Symposium on Formal Methods for Components and Objects, Lecture Notes in Computer Science, 2005.
-
(2005)
Lecture Notes in Computer Science
-
-
Sheyner, O.1
Wing, J.2
-
22
-
-
84964504906
-
Computer-attack graph generation tool
-
June
-
L. Swiler, C. Phillips, D. Ellis, and S. Chakerian. Computer-attack graph generation tool. In Proceedings DISCEX '01: DARPA Information Survivability Conference & Exposition II, pages 307-321, June 2001.
-
(2001)
Proceedings DISCEX '01: DARPA Information Survivability Conference & Exposition
, vol.2
, pp. 307-321
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
23
-
-
0034593179
-
A requires/provides model for computer attacks
-
Cork, Ireland, September
-
S. Templeton and K. Levitt. A requires/provides model for computer attacks. In Proceedings of the New Security Paradigms Workshop, Cork, Ireland, September 2000. http://seclab.cs.ucdavis.edu/papers/NP2000-rev.pdf.
-
(2000)
Proceedings of the New Security Paradigms Workshop
-
-
Templeton, S.1
Levitt, K.2
-
24
-
-
67349165215
-
Composable tools for network discovery and security analysis
-
Las Vegas, December
-
G. Vigna, F. Valeur, J. Zhou, and R. Kremmerer. Composable tools for network discovery and security analysis. In Proceedings ACSAC 2002: 18th Annual Computer Security Applications Conference, Las Vegas, December 2002.
-
(2002)
Proceedings ACSAC 2002: 18th Annual Computer Security Applications Conference
-
-
Vigna, G.1
Valeur, F.2
Zhou, J.3
Kremmerer, R.4
|