메뉴 건너뛰기




Volumn , Issue , 2007, Pages 420-427

Towards quantifying the (in)security of networked systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEMS; CRYPTOGRAPHY; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 34548757194     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2007.138     Document Type: Conference Paper
Times cited : (17)

References (14)
  • 1
    • 0038687692 scopus 로고    scopus 로고
    • Scalable, graph-based network vulnerability analysis
    • P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In ACM CCS'02, pp 217-224.
    • ACM CCS'02 , pp. 217-224
    • Ammann, P.1    Wijesekera, D.2    Kaushik, S.3
  • 4
    • 2642519111 scopus 로고    scopus 로고
    • Privilege graph: An extension to the typed access matrix model
    • M. Dacier and Y. Deswarte. Privilege graph: an extension to the typed access matrix model. In Proc. of ESORICS'94, pp 319-334.
    • Proc. of ESORICS'94 , pp. 319-334
    • Dacier, M.1    Deswarte, Y.2
  • 6
    • 0035001146 scopus 로고    scopus 로고
    • Survivability analysis of networked systems
    • S. Jha and J. Wing. Survivability analysis of networked systems. In Proc. ICSE'01, pp 307-317.
    • Proc. ICSE'01 , pp. 307-317
    • Jha, S.1    Wing, J.2
  • 7
    • 0026156688 scopus 로고
    • Directed-graph epidemiological models of computer viruses
    • J. Kephart and S. White. Directed-graph epidemiological models of computer viruses. In IEEE Symposium on Security and Privacy, pages 343-361, 1991.
    • (1991) IEEE Symposium on Security and Privacy , pp. 343-361
    • Kephart, J.1    White, S.2
  • 9
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Softw. Eng., 25(5):633-650, 1999.
    • (1999) IEEE Trans. Softw. Eng , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 10
    • 84988504967 scopus 로고    scopus 로고
    • A graph-based system for network-vulnerability analysis
    • C. Phillips and L. Swiler. A graph-based system for network-vulnerability analysis. In Proc. NSPW'98, pp 71-79.
    • Proc. NSPW'98 , pp. 71-79
    • Phillips, C.1    Swiler, L.2
  • 11
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • H. Wang, C. Guo, D. Simon, and A. Zugenmaier. Shield: vulnerability-driven network filters for preventing known vulnerability exploits. In Proc. ACM SIGCOMM'04, pp 193-204.
    • Proc. ACM SIGCOMM'04 , pp. 193-204
    • Wang, H.1    Guo, C.2    Simon, D.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.