메뉴 건너뛰기




Volumn , Issue , 2008, Pages 152-160

A near real-time system for security assurance assessment

Author keywords

Security assurance; Security assurance assessment; Security assurance evaluation

Indexed keywords

COMPUTER SOFTWARE; ELECTRIC BREAKDOWN; REAL TIME SYSTEMS;

EID: 51849089070     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIMP.2008.28     Document Type: Conference Paper
Times cited : (16)

References (28)
  • 1
    • 51849159355 scopus 로고    scopus 로고
    • ACSA, ed. (2002) Proceeding of the Workshop on Information Security System Scoring and Ranking (WISSSR), May 21-23, 2001, Williamsburg, Virginia.
    • ACSA, ed. (2002) Proceeding of the Workshop on Information Security System Scoring and Ranking (WISSSR), May 21-23, 2001, Williamsburg, Virginia.
  • 3
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science, Addison Wesley Professional, December
    • Bishop, M. (2002) Computer Security: Art and Science, Addison Wesley Professional, December 2002.
    • (2002) Computer Security
    • Bishop, M.1
  • 4
    • 51849155739 scopus 로고    scopus 로고
    • CC (2005) Common Criteria for Information. Technology Security Evaluation. Part 1: Introduction and general model, v2.3. Part 2: Security functional requirements, v2.3. Part 3: Security assurance requirements, v2.3.
    • CC (2005) Common Criteria for Information. Technology Security Evaluation. Part 1: Introduction and general model, v2.3. Part 2: Security functional requirements, v2.3. Part 3: Security assurance requirements, v2.3.
  • 7
    • 39049104457 scopus 로고    scopus 로고
    • nd Annual Computer Security Applications Conference, Florida, 2006.
    • nd Annual Computer Security Applications Conference, Florida, 2006.
  • 9
    • 35148893877 scopus 로고    scopus 로고
    • Evaluating and Strengthening Enterprise Network Security Using Attack Graph
    • Technical Report, MIT Lincoln Laboratory, Lexington, MA
    • Lippmann, R. et al (2005) Evaluating and Strengthening Enterprise Network Security Using Attack Graph, Technical Report, MIT Lincoln Laboratory, Lexington, MA, 2005.
    • (2005)
    • Lippmann, R.1
  • 10
    • 34047168454 scopus 로고    scopus 로고
    • An Annotated Review of Past Papers on Attack Graphs
    • Technical Report, MIT Lincoln Laboratory, Lexington, MA
    • Lippmann, R. et al (2005) An Annotated Review of Past Papers on Attack Graphs, Technical Report, MIT Lincoln Laboratory, Lexington, MA, 2005.
    • (2005)
    • Lippmann, R.1
  • 14
    • 51849090307 scopus 로고    scopus 로고
    • Nandy, B., Pieda, P., Seddigh, N., Lambadaris, J., Matrway, A., Hatfield, A. (2005) Information Assurance Metrics, Technical report, Public Safety and Emergency Preparedness, 2005, Canada.
    • Nandy, B., Pieda, P., Seddigh, N., Lambadaris, J., Matrway, A., Hatfield, A. (2005) Information Assurance Metrics, Technical report, Public Safety and Emergency Preparedness, 2005, Canada.
  • 19
    • 33746499095 scopus 로고    scopus 로고
    • Multivariate Statistical Analysis for Network Attacks Detection
    • International Conference on Computer Systems and Applications
    • Qu, G., Hariri, S., Yousif, M. (2005) Multivariate Statistical Analysis for Network Attacks Detection, Proceedings of the ACS/IEEE 2005 International Conference on Computer Systems and Applications.
    • (2005) Proceedings of the ACS/IEEE
    • Qu, G.1    Hariri, S.2    Yousif, M.3
  • 20
    • 34548119528 scopus 로고    scopus 로고
    • Riguidel, M.., Hecker, A. & Simon, V. (2006) Armature for Critical Infrastructure, Proceeding of the 2006 IEEE International Conference on Systems, Man, and Cybernetics, October 08-11, 2006, Taipei, Taiwan.
    • Riguidel, M.., Hecker, A. & Simon, V. (2006) Armature for Critical Infrastructure, Proceeding of the 2006 IEEE International Conference on Systems, Man, and Cybernetics, October 08-11, 2006, Taipei, Taiwan.
  • 24
    • 84969544889 scopus 로고    scopus 로고
    • th Annual Hawaii International Conference on System Sciences, January 6-9, 2003, Hawaii.
    • th Annual Hawaii International Conference on System Sciences, January 6-9, 2003, Hawaii.
  • 26
    • 51849087478 scopus 로고    scopus 로고
    • st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 8-11, 2007, CA, USA.
    • st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 8-11, 2007, CA, USA.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.