메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 273-284

Automated generation and analysis of attack graphs

Author keywords

Privacy; Security

Indexed keywords

COMPUTER SYSTEM FIREWALLS; COST EFFECTIVENESS; DATA PRIVACY; GRAPHIC METHODS; INTRUSION DETECTION; MODEL CHECKING;

EID: 44049089202     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2002.1004377     Document Type: Conference Paper
Times cited : (647)

References (25)
  • 2
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • Aug
    • R. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, Aug. 1986.
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.1
  • 7
    • 84944201343 scopus 로고    scopus 로고
    • Lambda: A language to model a database for detection of attacks
    • Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID), Springer-Verlag
    • F. Cuppens and R. Ortalo. Lambda: A language to model a database for detection of attacks. In Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID), number 1907 in LNCS, pages 197-216. Springer-Verlag, 2000.
    • (2000) LNCS , Issue.1907 , pp. 197-216
    • Cuppens, F.1    Ortalo, R.2
  • 9
    • 85082163761 scopus 로고    scopus 로고
    • R. Deraison. Nessus Scanner. http://www.nessus.org.
    • Deraison, R.1
  • 15
    • 0002584997 scopus 로고
    • Formal verification of the Gigamax cache consistency protocol
    • N. Suzuki, editor, MIT Press
    • K. McMillan and J. Schwalbe. Formal verification of the Gigamax cache consistency protocol. In N. Suzuki, editor, Shared Memory Multiprocessing. MIT Press, 1992.
    • (1992) Shared Memory Multiprocessing
    • McMillan, K.1    Schwalbe, J.2
  • 17
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • September/October
    • R. Ortalo, Y. Dewarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25(5):633-650, September/October 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Dewarte, Y.2    Kaaniche, M.3
  • 18
    • 84988504967 scopus 로고    scopus 로고
    • A graph-based system for network vulnerability analysis
    • C. Phillips and L. Swiler. A graph-based system for network vulnerability analysis. In New Security Paradigms Workshop, pages 71-79, 1998.
    • (1998) New Security Paradigms Workshop , pp. 71-79
    • Phillips, C.1    Swiler, L.2
  • 21
    • 0002670359 scopus 로고    scopus 로고
    • Modeling security threats
    • December
    • B. Schneier. Modeling security threats. Dr. Dobb's Journal, December 1999.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 25
    • 0002067431 scopus 로고    scopus 로고
    • Netstat: A network-based intrusion detection system
    • G. Vigna and R. Kemmerer. Netstat: A network-based intrusion detection system. Journal of Computer Security, 7(1), 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Vigna, G.1    Kemmerer, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.