-
1
-
-
77957015365
-
Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration
-
In: In U.E. Gattiker (Ed.), Copenhagen, EICARe. V
-
Rieke, R.: Tool based formal Modelling, Analysis and Visualisation of Enterprise Network Vulnerabilities utilising Attack Graph Exploration. In: In U.E. Gattiker (Ed.), Eicar 2004 Conference CD-rom: Best Paper Proceedings, Copenhagen, EICARe. V. (2004)
-
(2004)
Eicar 2004 Conference CD-rom: Best Paper Proceedings
-
-
Rieke, R.1
-
2
-
-
84988504967
-
A graph-based system for network-vulnerability analysis
-
September 22-25, Charlottsville, VA, USA, ACM Press (1998)
-
Phillips, C.A., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: NSPW '98, Proceedings of the 1998 Workshop on New Security Paradigms, September 22-25, 1998, Charlottsville, VA, USA, ACM Press (1998) 71-79
-
(1998)
NSPW '98, Proceedings of the 1998 Workshop on New Security Paradigms
, pp. 71-79
-
-
Phillips, C.A.1
Swiler, L.P.2
-
3
-
-
84964504906
-
Computer-attack graph generation tool
-
June 12-14, 2001, Anaheim, California, IEEE Computer Society
-
Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: DARPA Information Survivability Conference and Exposition (DISCEX II'01) Volume 2, June 12-14, 2001, Anaheim, California, IEEE Computer Society (2001) 1307-1321
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II'01)
, vol.2
, pp. 1307-1321
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
4
-
-
84948760464
-
Two formal analyses of attack graphs
-
24-26 June 2002, Cape Breton, Nova Scotia, Canada, IEEE Computer Society
-
Jha, S., Sheyner, O., Wing, J.M.: Two formal analyses of attack graphs. In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, IEEE Computer Society (2002) 49-63
-
(2002)
15th IEEE Computer Security Foundations Workshop (CSFW-15 2002)
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.M.3
-
5
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
May 12-15, 2002, Berkeley, California, USA, IEEE Comp. Soc. Press
-
Sheyner, O., Haines, J.W., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: 2002 IEEE Symposium on Security and Privacy, May 12-15, 2002, Berkeley, California, USA, IEEE Comp. Soc. Press (2002) 273-284
-
(2002)
2002 IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.W.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
6
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
ACM Press New York, NY, USA
-
Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM conference on Computer and communications security, ACM Press New York, NY, USA (2002) 217-224
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
7
-
-
20444480299
-
Managing attack graph complexity through visual hierarchical aggregation
-
New York, NY, USA, ACM Press
-
Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, New York, NY, USA, ACM Press (2004) 109-118
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 109-118
-
-
Noel, S.1
Jajodia, S.2
-
8
-
-
33749520206
-
Multiple coordinated views for network attack graphs
-
Los Alamitos, CA, USA, IEEE Computer Society
-
Noel, S., Jacobs, M., Kalapa, P., Jajodia, S.: Multiple Coordinated Views for Network Attack Graphs. In: IEEE Workshop on Visualization for Computer Security (VizSec'05), Los Alamitos, CA, USA, IEEE Computer Society (2005)
-
(2005)
IEEE Workshop on Visualization for Computer Security (VizSec'05)
-
-
Noel, S.1
Jacobs, M.2
Kalapa, P.3
Jajodia, S.4
-
10
-
-
77956988169
-
M2d2: A formal data model for ids alert correlation
-
RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings. Lecture Notes in Computer Science., Springer
-
Morin, B., Mé, L., Debar, H., Ducassé, M.: M2d2: A formal data model for ids alert correlation. In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings. Volume 2516 of Lecture Notes in Computer Science., Springer (2002) 115-137
-
(2002)
Recent Advances in Intrusion Detection, 5th International Symposium
, vol.2516
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
11
-
-
33751017347
-
A formal approach to specify and deploy a network security policy
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T., Mìege, A.: A formal approach to specify and deploy a network security policy. In: Second Workshop on Formal Aspects in Security and Trust (FAST). (2004)
-
(2004)
Second Workshop on Formal Aspects in Security and Trust (FAST)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Mìege, A.4
-
12
-
-
26844510610
-
The Sh-verification tool abstraction-based verification of co-operating systems. Formal aspects of computing
-
Ochsenschläger, P., Repp, J., Rieke, R., Nitsche, U.: The SH-Verification Tool Abstraction-Based Verification of Co-operating Systems. Formal Aspects of Computing, The International Journal of Formal Method 11 (1999) 1-24
-
(1999)
The International Journal of Formal Method
, vol.11
, pp. 1-24
-
-
Ochsenschläger, P.1
Repp, J.2
Rieke, R.3
Nitsche, U.4
-
13
-
-
25044449822
-
The sh-verification tool
-
Orlando, FL, USA, AAAI Press
-
Ochsenschläger, P., Repp, J., Rieke, R.: The SH-Verification Tool. In: Proc. 13th International FLorida Artificial Intelligence Research Society Conference (FLAIRS-2000), Orlando, FL, USA, AAAI Press (2000) 18-22
-
(2000)
Proc. 13th International FLorida Artificial Intelligence Research Society Conference (FLAIRS-2000)
, pp. 18-22
-
-
Ochsenschläger, P.1
Repp, J.2
Rieke, R.3
-
15
-
-
25044467567
-
Verification of cooperating systems - an approach based on formal languages
-
Orlando, FL, USA, AAAI Press
-
Ochsenschläger, P., Repp, J., Rieke, R.: Verification of Cooperating Systems - An Approach Based on Formal Languages. In: Proc. 13th International FLorida Artificial Intelligence Research Society Conference (FLAIRS-2000), Orlando, FL, USA, AAAI Press (2000) 346-350
-
(2000)
Proc. 13th International FLorida Artificial Intelligence Research Society Conference (FLAIRS-2000)
, pp. 346-350
-
-
Ochsenschläger, P.1
Repp, J.2
Rieke, R.3
|