메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1455-1460

SecureRank: A risk-based vulnerability management scheme for computing infrastructures

Author keywords

[No Author keywords available]

Indexed keywords

RANDOM ATTACKER; VULNERABILITY MANAGEMENT;

EID: 38549087035     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2007.244     Document Type: Conference Paper
Times cited : (29)

References (19)
  • 2
    • 38549147639 scopus 로고    scopus 로고
    • The laws of vulnerabilities: Six axioms for understanding risk
    • Qualys, 2, Online, Available
    • "The laws of vulnerabilities: Six axioms for understanding risk," Qualys, 2 2006. [Online]. Available: http://www.qualys.com/docs/ laws_of_vulnerabilities.pdf
    • (2006)
  • 4
    • 38549134573 scopus 로고    scopus 로고
    • August 2006, Online, Available
    • "Worm sparks rise in zombie pes," August 2006. [Online]. Available: http://news.com.com/Worm+sparks+rise+in+zombie+PCs/2100-7349_3- 6108409.html?tag=nefd.top
    • Worm sparks rise in zombie pes
  • 5
    • 41349118476 scopus 로고    scopus 로고
    • Halting viruses in scale-free networks
    • May
    • Z. Dezso and A.-L. Barabasi, "Halting viruses in scale-free networks," Phys. Rev. E, vol. 65, no. 5, p. 055103, May 2002.
    • (2002) Phys. Rev. E , vol.65 , Issue.5 , pp. 055103
    • Dezso, Z.1    Barabasi, A.-L.2
  • 7
    • 38549153903 scopus 로고    scopus 로고
    • September 2006, Online, Available
    • "Cvss database guide," September 2006. [Online]. Available: http://www.first.org/cvss/cvss-guide.html
    • Cvss database guide
  • 9
    • 0036013593 scopus 로고    scopus 로고
    • Statistical mechanics of complex networks
    • January
    • R. Albert and A.-L. Barabasi, "Statistical mechanics of complex networks," Reviews of Modern Physics, vol. 74, no. 1, pp. 47-97, January 2002.
    • (2002) Reviews of Modern Physics , vol.74 , Issue.1 , pp. 47-97
    • Albert, R.1    Barabasi, A.-L.2
  • 11
    • 20744442724 scopus 로고    scopus 로고
    • On the spread of virases on the internet
    • N. Berger, C. Borgs, J. T. Chayes, and A. Saberi, "On the spread of virases on the internet," in SODA, 2005, pp. 301-310.
    • (2005) SODA , pp. 301-310
    • Berger, N.1    Borgs, C.2    Chayes, J.T.3    Saberi, A.4
  • 12
    • 29844458140 scopus 로고    scopus 로고
    • Understanding internet topology: Principles, models, and validation
    • D. Alderson, L. Li, W. Willinger, and J. C. Doyle, "Understanding internet topology: principles, models, and validation," IEEE/ACM Trans. Netw., vol. 13, no. 6, pp. 1205-1218, 2005.
    • (2005) IEEE/ACM Trans. Netw , vol.13 , Issue.6 , pp. 1205-1218
    • Alderson, D.1    Li, L.2    Willinger, W.3    Doyle, J.C.4
  • 13
    • 2142758072 scopus 로고    scopus 로고
    • Technological networks and the spread of computer viruses
    • April, Online, Available
    • J. Balthrop, S. Forrest, M. J. Newman, and M. M. Williamson, "Technological networks and the spread of computer viruses," Science, vol. 304, no. 5670, pp. 527-529, April 2004. [Online]. Available: http://www.sciencemag.org/cgi/content/full/304/5670/527
    • (2004) Science , vol.304 , Issue.5670 , pp. 527-529
    • Balthrop, J.1    Forrest, S.2    Newman, M.J.3    Williamson, M.M.4
  • 15
    • 84990029315 scopus 로고    scopus 로고
    • The economics of information security investment
    • L. A. Gordon and M. P. Loeb, "The economics of information security investment," ACM Trans. Inf. Syst. Secur., vol. 5, no. 4, pp. 438-457, 2002.
    • (2002) ACM Trans. Inf. Syst. Secur , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.A.1    Loeb, M.P.2
  • 16
    • 38549133598 scopus 로고    scopus 로고
    • K. S. Hoo, How much is enough? a risk-management approach to computer security, Ph.D. dissertation, Stanford University, August 2000. [Online]. Available: iis-db.stanford.edu/pubs/11900/soohoo.pdf
    • K. S. Hoo, "How much is enough? a risk-management approach to computer security," Ph.D. dissertation, Stanford University, August 2000. [Online]. Available: iis-db.stanford.edu/pubs/11900/soohoo.pdf
  • 17
    • 24944458972 scopus 로고    scopus 로고
    • Including technical and security risks in the management of information systems: A programmatic risk, management model
    • R. L. Dillon and M. E. Pate-Cornell, "Including technical and security risks in the management of information systems: A programmatic risk, management model." Systems Engineering, vol. 8, no. 1, pp. 15-28, 2005.
    • (2005) Systems Engineering , vol.8 , Issue.1 , pp. 15-28
    • Dillon, R.L.1    Pate-Cornell, M.E.2
  • 18
    • 38549169641 scopus 로고    scopus 로고
    • L. Page, S. Brin, R. Motwani, and T. Winograd, The pagerank citation ranking: Bringing order to the web, Stanford Digital Library Technologies Project, Tech. Rep., 1998. [Online]. Available: citeseer.ist.psu.edu/page98pagerank.html
    • L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation ranking: Bringing order to the web," Stanford Digital Library Technologies Project, Tech. Rep., 1998. [Online]. Available: citeseer.ist.psu.edu/page98pagerank.html
  • 19
    • 84906232105 scopus 로고    scopus 로고
    • A. N. Langville and C. D. Meyer, Deeper inside pagerank, Internet Mathematics, 1, no. 3, pp. 335-380, 2003.
    • A. N. Langville and C. D. Meyer, "Deeper inside pagerank," Internet Mathematics, vol. 1, no. 3, pp. 335-380, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.