메뉴 건너뛰기




Volumn 6973, Issue , 2008, Pages

Virtual terrain: A security-based representation of a computer network

Author keywords

Alert correlation; Computer network; Cyber security; Impact assessment; Information fusion; Network modeling; Threat assessment

Indexed keywords

AD HOC NETWORKS; COMPUTER CRIME; GRAPH THEORY; MATHEMATICAL MODELS; SECURITY OF DATA; USER INTERFACES; VIRTUAL REALITY;

EID: 43249121200     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.776980     Document Type: Conference Paper
Times cited : (15)

References (16)
  • 1
    • 43249126986 scopus 로고    scopus 로고
    • Argauer, B. VTAC: Virtual Terrain Assisted Impact Assessment for Cyber Attacks. Master's Thesis. Rochester Institute of Technology, 2007.
    • Argauer, B. VTAC: Virtual Terrain Assisted Impact Assessment for Cyber Attacks. Master's Thesis. Rochester Institute of Technology, 2007.
  • 2
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • April
    • Bass, T. "Intrusion detection systems and multisensor data fusion," Communications of the ACM 43, April 2000.
    • (2000) Communications of the ACM , vol.43
    • Bass, T.1
  • 6
    • 34047168454 scopus 로고    scopus 로고
    • An annotated review of past papers on attack graphs
    • Technical Report ESC-TR-2005-054. Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA. March
    • Lippman, R. and Ingols, K. An annotated review of past papers on attack graphs. Technical Report ESC-TR-2005-054. Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA. March 2005.
    • (2005)
    • Lippman, R.1    Ingols, K.2
  • 9
    • 43249101341 scopus 로고    scopus 로고
    • OPNET Technologies Inc
    • OPNET Technologies Inc., http://www.opnet.com.
  • 13
    • 43249096480 scopus 로고    scopus 로고
    • T. N. S. Inc., Nessus vulnerability scanner. http://www.nessus.org/, 2007.
    • T. N. S. Inc., "Nessus vulnerability scanner." http://www.nessus.org/, 2007.
  • 15
    • 33747345465 scopus 로고    scopus 로고
    • Using vulnerability trees for decision making in threat assessment
    • Technical Report CS03-2, University of Glamorgan, School of Computing, June
    • Vidalis, S. and Jones A. Using vulnerability trees for decision making in threat assessment. Technical Report CS03-2, University of Glamorgan, School of Computing, June 2003.
    • (2003)
    • Vidalis, S.1    Jones, A.2
  • 16
    • 43249116598 scopus 로고    scopus 로고
    • Terrain and Behavior Modeling for Projecting Multistage Cyber Attacks
    • Quebec, Canada. July
    • Yang, S. J., et al. Terrain and Behavior Modeling for Projecting Multistage Cyber Attacks. In proceedings of International Data Fusion Conference. Quebec, Canada. July 2007.
    • (2007) proceedings of International Data Fusion Conference
    • Yang, S.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.