-
1
-
-
84927689287
-
A formal method for attack modeling and detection (tr-06-01)
-
Technical report, Rensselaer Polytechnic Institute, Computer Science Department, January
-
S. A. Camtepe and B. Yener. A formal method for attack modeling and detection (tr-06-01). Technical report, Rensselaer Polytechnic Institute, Computer Science Department, January 2006.
-
(2006)
-
-
Camtepe, S.A.1
Yener, B.2
-
2
-
-
16244382300
-
Military academy attack/defense network
-
June
-
C. A. Carver, J. R. Surdu, J. M. Hill, D. Ragsdale, S. D. Lathrop, and T. Presby. Military academy attack/defense network, pages 29-34. Proceedings of 3rd Annual IEEE Information Assurance Workshop, June 2002.
-
(2002)
Proceedings of 3rd Annual IEEE Information Assurance Workshop
, pp. 29-34
-
-
Carver, C.A.1
Surdu, J.R.2
Hill, J.M.3
Ragsdale, D.4
Lathrop, S.D.5
Presby, T.6
-
4
-
-
48349106171
-
-
A. Futoransky, L. Notarfrancesco, R. Gerardo, and S. Carlos. Building computer network attacks. Technical report, CoreLabs
-
A. Futoransky, L. Notarfrancesco, R. Gerardo, and S. Carlos. Building computer network attacks. Technical report, CoreLabs.
-
-
-
-
6
-
-
48349090996
-
-
S. Jha, O. Sheyner, and J. Wing. Minimization and reliability analyses of attack graphs(minimization and reliability analyses of attack graphs). Technical report, School of Computer Science Carnegie Mellon University, february 2002.
-
S. Jha, O. Sheyner, and J. Wing. Minimization and reliability analyses of attack graphs(minimization and reliability analyses of attack graphs). Technical report, School of Computer Science Carnegie Mellon University, february 2002.
-
-
-
-
7
-
-
34547366032
-
Intelligent retrieval agent based on distributed environment
-
August
-
H. K. Kim. Intelligent retrieval agent based on distributed environment, pages 137-143. Proceeding of 4th SERA, August 2006.
-
(2006)
Proceeding of 4th SERA
, pp. 137-143
-
-
Kim, H.K.1
-
9
-
-
84856542536
-
Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet
-
June
-
I. Kotenko. Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet. Proceedings 19th ECMS, June 2005.
-
(2005)
Proceedings 19th ECMS
-
-
Kotenko, I.1
-
11
-
-
48349129128
-
Monitoring and investigation of dos attack
-
February
-
J. Y. Lee, M. S. Yoon, and H. Lee. Monitoring and investigation of dos attack. KNOM Review, 6(2):33-40, February 2004.
-
(2004)
KNOM Review
, vol.6
, Issue.2
, pp. 33-40
-
-
Lee, J.Y.1
Yoon, M.S.2
Lee, H.3
-
12
-
-
0038226150
-
Attack modeling for information security and survivability (cmu/sci-2001-tn-001)
-
Technical report, CMU/SEI, March
-
A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability (cmu/sci-2001-tn-001). Technical report, CMU/SEI, March 2001.
-
(2001)
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
13
-
-
0035381945
-
Information warfare: Battles in cyberspace
-
June
-
R. E. Overill. Information warfare: battles in cyberspace. Computing and Control Engineering Journal, 12(3): 125-128, June 2001.
-
(2001)
Computing and Control Engineering Journal
, vol.12
, Issue.3
, pp. 125-128
-
-
Overill, R.E.1
-
14
-
-
0002670359
-
Attack trees: Modeling security threats
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal.
-
Dr. Dobb's Journal
-
-
Schneier, B.1
-
17
-
-
0009516633
-
A process control approach to cyber attack detection
-
August
-
N. Ye, J. Giordano, and J. Feldman. A process control approach to cyber attack detection. Communications of the ACM, 44(8):77-82, August 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.8
, pp. 77-82
-
-
Ye, N.1
Giordano, J.2
Feldman, J.3
|