-
1
-
-
51849159355
-
-
ACSA, ed. (2002) Proceeding of the Workshop on Information Security System Scoring and Ranking (WISSSR), May 21-23, 2001, Williamsburg, Virginia.
-
ACSA, ed. (2002) Proceeding of the Workshop on Information Security System Scoring and Ranking (WISSSR), May 21-23, 2001, Williamsburg, Virginia.
-
-
-
-
2
-
-
0038687692
-
Scalable, Graph-Based Network Vulnerability Analysis
-
Washington, DC, November
-
Ammann, P., Wijesekera, D., Kaushik, S. (2002) Scalable, Graph-Based Network Vulnerability Analysis Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002. pp 217-224
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
3
-
-
0346236349
-
-
Art and Science, Addison Wesley Professional, December
-
Bishop, M. (2002) Computer Security: Art and Science, Addison Wesley Professional, December 2002.
-
(2002)
Computer Security
-
-
Bishop, M.1
-
4
-
-
51849155739
-
-
CC (2005) Common Criteria for Information. Technology Security Evaluation. Part 1: Introduction and general model, v2.3. Part 2: Security functional requirements, v2.3. Part 3: Security assurance requirements, v2.3.
-
CC (2005) Common Criteria for Information. Technology Security Evaluation. Part 1: Introduction and general model, v2.3. Part 2: Security functional requirements, v2.3. Part 3: Security assurance requirements, v2.3.
-
-
-
-
5
-
-
15944397932
-
Qualitative and Quantitative Analytical Techniques for Network Security Assessment
-
June 10-11, West Point, New York
-
Clark, K., Tyree, S., Dawkins, J. & Hale, J. (2004) Qualitative and Quantitative Analytical Techniques for Network Security Assessment, Proceeding of the 2004 IEEE Workshop on Information Assurance, June 10-11, West Point, New York.
-
(2004)
Proceeding of the 2004 IEEE Workshop on Information Assurance
-
-
Clark, K.1
Tyree, S.2
Dawkins, J.3
Hale, J.4
-
6
-
-
15944391638
-
Measuring IT Security -a Method Based on Common Criteria's Security Functional Requirements
-
West Point, NY, June
-
Hunstad, A., Hallberg, J., Andersson, R. (2004) Measuring IT Security -a Method Based on Common Criteria's Security Functional Requirements, Proceedings of the 2004 IEEE Workshop on Information Assurance, West Point, NY, June 2004.
-
(2004)
Proceedings of the 2004 IEEE Workshop on Information Assurance
-
-
Hunstad, A.1
Hallberg, J.2
Andersson, R.3
-
7
-
-
39049104457
-
-
nd Annual Computer Security Applications Conference, Florida, 2006.
-
nd Annual Computer Security Applications Conference, Florida, 2006.
-
-
-
-
8
-
-
20444498659
-
-
Chapter 5, Kluwer Academic Publisher
-
Jajodia, S., Nodel, S., O'Berry, B., (2003) Topological Analysis of Network Attack Vulnerability, Chapter 5, Kluwer Academic Publisher, 2003.
-
(2003)
Topological Analysis of Network Attack Vulnerability
-
-
Jajodia, S.1
Nodel, S.2
O'Berry, B.3
-
9
-
-
35148893877
-
Evaluating and Strengthening Enterprise Network Security Using Attack Graph
-
Technical Report, MIT Lincoln Laboratory, Lexington, MA
-
Lippmann, R. et al (2005) Evaluating and Strengthening Enterprise Network Security Using Attack Graph, Technical Report, MIT Lincoln Laboratory, Lexington, MA, 2005.
-
(2005)
-
-
Lippmann, R.1
-
10
-
-
34047168454
-
An Annotated Review of Past Papers on Attack Graphs
-
Technical Report, MIT Lincoln Laboratory, Lexington, MA
-
Lippmann, R. et al (2005) An Annotated Review of Past Papers on Attack Graphs, Technical Report, MIT Lincoln Laboratory, Lexington, MA, 2005.
-
(2005)
-
-
Lippmann, R.1
-
11
-
-
35148844598
-
Validating and Restoring Defense in Depth Using Attack Graphs
-
Washington
-
Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., Cunningham, R., Validating and Restoring Defense in Depth Using Attack Graphs, Military Communications Conference, Washington, 2006.
-
(2006)
Military Communications Conference
-
-
Lippmann, R.1
Ingols, K.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
14
-
-
51849090307
-
-
Nandy, B., Pieda, P., Seddigh, N., Lambadaris, J., Matrway, A., Hatfield, A. (2005) Information Assurance Metrics, Technical report, Public Safety and Emergency Preparedness, 2005, Canada.
-
Nandy, B., Pieda, P., Seddigh, N., Lambadaris, J., Matrway, A., Hatfield, A. (2005) Information Assurance Metrics, Technical report, Public Safety and Emergency Preparedness, 2005, Canada.
-
-
-
-
16
-
-
15944405288
-
Analyzing the Security and Survivability of Real-time Control Systems
-
June 10-11, West Point, New York
-
Oman, P., Krings, A., Conte de Leon, D., & Alves-Foss, J. (2004) Analyzing the Security and Survivability of Real-time Control Systems, Proceeding of the 2004 IEEE Workshop on Information Assurance, June 10-11 2004, West Point, New York.
-
(2004)
Proceeding of the 2004 IEEE Workshop on Information Assurance
-
-
Oman, P.1
Krings, A.2
Conte de Leon, D.3
Alves-Foss, J.4
-
18
-
-
47849093579
-
Security Assurance Aggregation for IT Infrastructures
-
France
-
Pham, N., Riguidel, M. (2007) Security Assurance Aggregation for IT Infrastructures, Proceeding of the Second International Conference on Systems and Networks Communications, August 25-31, 2007, Cap Esterel, France.
-
(2007)
Proceeding of the Second International Conference on Systems and Networks Communications, August 25-31, 2007, Cap Esterel
-
-
Pham, N.1
Riguidel, M.2
-
19
-
-
33746499095
-
Multivariate Statistical Analysis for Network Attacks Detection
-
International Conference on Computer Systems and Applications
-
Qu, G., Hariri, S., Yousif, M. (2005) Multivariate Statistical Analysis for Network Attacks Detection, Proceedings of the ACS/IEEE 2005 International Conference on Computer Systems and Applications.
-
(2005)
Proceedings of the ACS/IEEE
-
-
Qu, G.1
Hariri, S.2
Yousif, M.3
-
20
-
-
34548119528
-
-
Riguidel, M.., Hecker, A. & Simon, V. (2006) Armature for Critical Infrastructure, Proceeding of the 2006 IEEE International Conference on Systems, Man, and Cybernetics, October 08-11, 2006, Taipei, Taiwan.
-
Riguidel, M.., Hecker, A. & Simon, V. (2006) Armature for Critical Infrastructure, Proceeding of the 2006 IEEE International Conference on Systems, Man, and Cybernetics, October 08-11, 2006, Taipei, Taiwan.
-
-
-
-
21
-
-
33745435096
-
Current Trends and Advances in Information Assurance Metrics
-
October 13-15, New Brunswick, Canada
-
Seddigh, N., Pieda, P., Mattrawy, A., Nandy, B., Lambardis, J. & Hatfield, A. (2004) Current Trends and Advances in Information Assurance Metrics, Proceeding of the Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, New Brunswick, Canada.
-
(2004)
Proceeding of the Second Annual Conference on Privacy, Security and Trust
-
-
Seddigh, N.1
Pieda, P.2
Mattrawy, A.3
Nandy, B.4
Lambardis, J.5
Hatfield, A.6
-
23
-
-
24944573251
-
Security Metrics Guide for Information Technology Systems
-
July
-
Swanson, M., Bartol, N., Sabato, J., Hash, J. & Graffo, L. (2003) Security Metrics Guide for Information Technology Systems, National Institute of Standards and Technology, Special Publication 800-55, July 2003.
-
(2003)
National Institute of Standards and Technology, Special Publication
, vol.800 -55
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
24
-
-
84969544889
-
-
th Annual Hawaii International Conference on System Sciences, January 6-9, 2003, Hawaii.
-
th Annual Hawaii International Conference on System Sciences, January 6-9, 2003, Hawaii.
-
-
-
-
26
-
-
51849087478
-
-
st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 8-11, 2007, CA, USA.
-
st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 8-11, 2007, CA, USA.
-
-
-
-
28
-
-
0346052082
-
A framework for security measurement
-
October 7-10, Baltimore, Maryland
-
Wang, C. & Wulf, W. (1997) A framework for security measurement, Proceeding of the National Information Systems Security Conference, October 7-10, 1997, Baltimore, Maryland.
-
(1997)
Proceeding of the National Information Systems Security Conference
-
-
Wang, C.1
Wulf, W.2
|