메뉴 건너뛰기




Volumn 4347 LNCS, Issue , 2006, Pages 67-78

Modelling and analysing network security policies in a given vulnerability setting

Author keywords

Attack simulation; Critical infrastructure protection; Network security policies; Risk assessment; Security modelling and simulation; Threats analysis

Indexed keywords

ATTACK SIMULATION; CRITICAL INFRASTRUCTURE PROTECTION; MODELLING AND SIMULATIONS; NETWORK SECURITY POLICY; THREATS ANALYSIS;

EID: 48349138669     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11962977_6     Document Type: Conference Paper
Times cited : (14)

References (15)
  • 1
    • 77957015365 scopus 로고    scopus 로고
    • Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration
    • In: In U.E. Gattiker (Ed.), Copenhagen, EICARe. V
    • Rieke, R.: Tool based formal Modelling, Analysis and Visualisation of Enterprise Network Vulnerabilities utilising Attack Graph Exploration. In: In U.E. Gattiker (Ed.), Eicar 2004 Conference CD-rom: Best Paper Proceedings, Copenhagen, EICARe. V. (2004)
    • (2004) Eicar 2004 Conference CD-rom: Best Paper Proceedings
    • Rieke, R.1
  • 2
  • 4
    • 84948760464 scopus 로고    scopus 로고
    • Two formal analyses of attack graphs
    • 24-26 June 2002, Cape Breton, Nova Scotia, Canada, IEEE Computer Society
    • Jha, S., Sheyner, O., Wing, J.M.: Two formal analyses of attack graphs. In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, IEEE Computer Society (2002) 49-63
    • (2002) 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002) , pp. 49-63
    • Jha, S.1    Sheyner, O.2    Wing, J.M.3
  • 5
    • 0036083194 scopus 로고    scopus 로고
    • Automated generation and analysis of attack graphs
    • May 12-15, 2002, Berkeley, California, USA, IEEE Comp. Soc. Press
    • Sheyner, O., Haines, J.W., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: 2002 IEEE Symposium on Security and Privacy, May 12-15, 2002, Berkeley, California, USA, IEEE Comp. Soc. Press (2002) 273-284
    • (2002) 2002 IEEE Symposium on Security and Privacy , pp. 273-284
    • Sheyner, O.1    Haines, J.W.2    Jha, S.3    Lippmann, R.4    Wing, J.M.5
  • 10
    • 77956988169 scopus 로고    scopus 로고
    • M2d2: A formal data model for ids alert correlation
    • RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings. Lecture Notes in Computer Science., Springer
    • Morin, B., Mé, L., Debar, H., Ducassé, M.: M2d2: A formal data model for ids alert correlation. In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings. Volume 2516 of Lecture Notes in Computer Science., Springer (2002) 115-137
    • (2002) Recent Advances in Intrusion Detection, 5th International Symposium , vol.2516 , pp. 115-137
    • Morin, B.1    Mé, L.2    Debar, H.3    Ducassé, M.4
  • 12
    • 26844510610 scopus 로고    scopus 로고
    • The Sh-verification tool abstraction-based verification of co-operating systems. Formal aspects of computing
    • Ochsenschläger, P., Repp, J., Rieke, R., Nitsche, U.: The SH-Verification Tool Abstraction-Based Verification of Co-operating Systems. Formal Aspects of Computing, The International Journal of Formal Method 11 (1999) 1-24
    • (1999) The International Journal of Formal Method , vol.11 , pp. 1-24
    • Ochsenschläger, P.1    Repp, J.2    Rieke, R.3    Nitsche, U.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.