-
1
-
-
77950899230
-
Know your enemy
-
tech. rep, Honeynet Project
-
"Know your enemy," tech. rep., Honeynet Project, 2000.
-
(2000)
-
-
-
2
-
-
48749104937
-
Adversary modeling to develop forensic observables,
-
BBN
-
J. Lowry, R. Valdex, and B. Wood, "Adversary modeling to develop forensic observables," tech. rep., BBN.
-
tech. rep
-
-
Lowry, J.1
Valdex, R.2
Wood, B.3
-
4
-
-
84857965930
-
Cyber Adversary Characterization
-
T. Parker, E. Shaw, E. Stroz, M. Devost, and M. Sachs, Cyber Adversary Characterization. Syngress, 2004.
-
(2004)
Syngress
-
-
Parker, T.1
Shaw, E.2
Stroz, E.3
Devost, M.4
Sachs, M.5
-
6
-
-
10944259927
-
Risk-based systems security engineering: Stopping attacks with intention
-
S. Evans, D. Heinbuch, E. Kyule, J. Piorkowski, and J. Wallner, "Risk-based systems security engineering: Stopping attacks with intention," Security and Privacy, vol. 2, no. 6, 2004.
-
(2004)
Security and Privacy
, vol.2
, Issue.6
-
-
Evans, S.1
Heinbuch, D.2
Kyule, E.3
Piorkowski, J.4
Wallner, J.5
-
7
-
-
48749084273
-
Observations on the effects of defense in depth on adversary behavior in cyber warfare,
-
BBN
-
D. Kewley and J. Lowry, "Observations on the effects of defense in depth on adversary behavior in cyber warfare," tech. rep., BBN.
-
tech. rep
-
-
Kewley, D.1
Lowry, J.2
-
8
-
-
0242513810
-
Making adversary decision modeling tractable with intent inference and information fusion
-
May
-
B. Bell, E. Santos, and S. Brown, "Making adversary decision modeling tractable with intent inference and information fusion," in Proceedings of the 11th Conference on Computer Generated Forces and Behavioral Representation, pp. 532-542, May 2002.
-
(2002)
Proceedings of the 11th Conference on Computer Generated Forces and Behavioral Representation
, pp. 532-542
-
-
Bell, B.1
Santos, E.2
Brown, S.3
-
9
-
-
15944397706
-
Intelligence preparation of the information battlespace- a methodical approach to cyber defense planning
-
IEEE, June
-
R. Moore, J. Williams, and C. McCain, "Intelligence preparation of the information battlespace- a methodical approach to cyber defense planning," in Proceedings of the 2001 IEEE Workshop on Infromation Assurance and Security, pp. 134-141, IEEE, June 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Infromation Assurance and Security
, pp. 134-141
-
-
Moore, R.1
Williams, J.2
McCain, C.3
-
11
-
-
33846269000
-
A host-based approach to network attack chaining analysis
-
IEEE, December
-
P. Ammann, J. Pamula, R. Ritchey, and J. Street, "A host-based approach to network attack chaining analysis," in Twenty-First Annual Computer Security Applications Conference, pp. 72-84, IEEE, December 2005.
-
(2005)
Twenty-First Annual Computer Security Applications Conference
, pp. 72-84
-
-
Ammann, P.1
Pamula, J.2
Ritchey, R.3
Street, J.4
-
13
-
-
20444475398
-
Modeling network attacks: Extending the attack tree paradigm
-
March
-
J. Dawkins, C. Campbell, R. Larson, K. Fitch, and T. Tidwell, "Modeling network attacks: Extending the attack tree paradigm," in Proceedings of the Third Annual International Systems Security Engineering Association Conference, pp. 109-118, March 2002.
-
(2002)
Proceedings of the Third Annual International Systems Security Engineering Association Conference
, pp. 109-118
-
-
Dawkins, J.1
Campbell, C.2
Larson, R.3
Fitch, K.4
Tidwell, T.5
-
14
-
-
48749129064
-
Modeling TCP/IP Networks Topology for Network Vulnerability Analysis
-
R. Zakeri, R. Shariari, R. Jalili, and R. Sadoddin, "Modeling TCP/IP Networks Topology for Network Vulnerability Analysis," in Proceedings of the International Symposium on Telecommunications, pp. 653-658, 2005.
-
(2005)
Proceedings of the International Symposium on Telecommunications
, pp. 653-658
-
-
Zakeri, R.1
Shariari, R.2
Jalili, R.3
Sadoddin, R.4
-
15
-
-
35248829694
-
-
th International Symposium of Formal Methods Europe (FME '03), no. 2805 in LNCS, pp. 914-940, Springer-Verlag, September 2003.
-
th International Symposium of Formal Methods Europe (FME '03), no. 2805 in LNCS, pp. 914-940, Springer-Verlag, September 2003.
-
-
-
-
16
-
-
0038289826
-
Kuang: Rule-based security checking,
-
MIT, Lab for Computer Science Programming Systems Research Group, Cambridge, MA, May
-
R. Baldwin, "Kuang: Rule-based security checking," tech. rep., MIT, Lab for Computer Science Programming Systems Research Group, Cambridge, MA, May 1994.
-
(1994)
tech. rep
-
-
Baldwin, R.1
-
17
-
-
85076884574
-
MulVAL: A logic-based network security analyzer
-
Usenix, IEEE, August
-
X. Ou, S. Govindavajhala, and A. Appel, "MulVAL: A logic-based network security analyzer," in 14th Usenix Security Symposium, pp. 113-128, Usenix, IEEE, August 2005.
-
(2005)
14th Usenix Security Symposium
, pp. 113-128
-
-
Ou, X.1
Govindavajhala, S.2
Appel, A.3
-
18
-
-
0002670359
-
Attack trees: Modeling security threats
-
December
-
B. Schneier, "Attack trees: Modeling security threats," Dr. Dobb's Journal, pp. 21-29, December 1999.
-
(1999)
Dr. Dobb's Journal
, pp. 21-29
-
-
Schneier, B.1
-
20
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, " Automated generation and analysis of attack graphs," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 273-284, 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
21
-
-
48749121426
-
Model checking and expert system approaches to attack graphs,
-
University of California, Davis, Davis, CA, August
-
S. Cheetancheri, "Model checking and expert system approaches to attack graphs," tech. rep., University of California, Davis, Davis, CA, August 2004.
-
(2004)
tech. rep
-
-
Cheetancheri, S.1
-
22
-
-
84948760464
-
Minimization and reliability analyses of attack graphs
-
S. Jha, O. Sheyner, and J. Wing, "Minimization and reliability analyses of attack graphs," in Proceedings of the Computer Security Foundations Workshop, pp. 49-63, 2002.
-
(2002)
Proceedings of the Computer Security Foundations Workshop
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
24
-
-
39049104457
-
Practical attack graph generation for network defense
-
December
-
K. Ingols, R. Lippmann, and K. Piwowarski, "Practical attack graph generation for network defense," in Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 121-130, December 2006.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
25
-
-
35148858636
-
System and method for risk detection and analysis in a computer network,
-
October, United States Patent No. 6,952,779
-
G. Cohen, M. Meiseles, and E. Reshef, "System and method for risk detection and analysis in a computer network," October 2005. United States Patent No. 6,952,779.
-
(2005)
-
-
Cohen, G.1
Meiseles, M.2
Reshef, E.3
-
26
-
-
0038687692
-
Scalable graph-based network vulnerability analysis
-
P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable graph-based network vulnerability analysis," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 217-224, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
|