-
1
-
-
0038687692
-
-
Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In: Proceedings of ninth ACM conference on computer and communications security, Washington, DC, Nov 2002.
-
Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In: Proceedings of ninth ACM conference on computer and communications security, Washington, DC, Nov 2002.
-
-
-
-
2
-
-
53049102976
-
-
Artz M. NetSPA, a network security planning architecture. M.S. thesis, Cambridge: Massachusetts Institute of Technology; May 2002.
-
Artz M. NetSPA, a network security planning architecture. M.S. thesis, Cambridge: Massachusetts Institute of Technology; May 2002.
-
-
-
-
3
-
-
18844379625
-
Multiple behavior information fusion based quantitative threat evaluation
-
Chen X., Zheng Q., Guan X., et al. Multiple behavior information fusion based quantitative threat evaluation. Computers and Security 24 (2005) 218-231
-
(2005)
Computers and Security
, vol.24
, pp. 218-231
-
-
Chen, X.1
Zheng, Q.2
Guan, X.3
-
4
-
-
84867339043
-
-
Cuppens F, Miege A. Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the 2002 IEEE symposium on security and privacy, May 2002.
-
Cuppens F, Miege A. Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the 2002 IEEE symposium on security and privacy, May 2002.
-
-
-
-
5
-
-
53049093507
-
-
Dacier M, Deswarte Y. The privilege graph: an extension to the typed access martrix model. In: European symposium in computer security, Nov 1994.
-
Dacier M, Deswarte Y. The privilege graph: an extension to the typed access martrix model. In: European symposium in computer security, Nov 1994.
-
-
-
-
6
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
Kumar V., Srivastava J., and Lazarevic A. (Eds), Kluwer Academic Publisher
-
Jajodia S., Noel S., and O'Berry B. Topological analysis of network attack vulnerability. In: Kumar V., Srivastava J., and Lazarevic A. (Eds). Managing Cyber Threats: Issues, Approaches and Challenges (2004), Kluwer Academic Publisher
-
(2004)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
7
-
-
0033691924
-
-
Mayer A, Wool A, Elisha Z. Fang: a firewall analysis engine. In: Proceedings of the IEEE symposium on security and privacy, May 2000.
-
Mayer A, Wool A, Elisha Z. Fang: a firewall analysis engine. In: Proceedings of the IEEE symposium on security and privacy, May 2000.
-
-
-
-
8
-
-
0038011185
-
-
Ning P, Cui Y, Reeves DS. Constructing attack scenarios through correlation of intrusion alerts. In: Proceedings of the ninth ACM conference on computer and communications security, Washington, DC, Nov 2002.
-
Ning P, Cui Y, Reeves DS. Constructing attack scenarios through correlation of intrusion alerts. In: Proceedings of the ninth ACM conference on computer and communications security, Washington, DC, Nov 2002.
-
-
-
-
9
-
-
84944727025
-
-
Noel S, Jajodia S, O'Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In: Proceedings of 19th annual computer security applications conference, Las Vegas, Nevada, Dec 2003.
-
Noel S, Jajodia S, O'Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In: Proceedings of 19th annual computer security applications conference, Las Vegas, Nevada, Dec 2003.
-
-
-
-
10
-
-
21644481812
-
-
Noel S, Robertson E, Jajodia S. Correlating intrusion events and building attack scenarios through attack graph distances. In: Proceedings of the 20th annual computer security applications conference, 2004.
-
Noel S, Robertson E, Jajodia S. Correlating intrusion events and building attack scenarios through attack graph distances. In: Proceedings of the 20th annual computer security applications conference, 2004.
-
-
-
-
11
-
-
0033718255
-
-
Ritchey R, Ammann P. Using model checking to analyze network vulnerabilities. In: Proceedings of 2000 IEEE symposium on security and privacy, Oakland, California, 2000.
-
Ritchey R, Ammann P. Using model checking to analyze network vulnerabilities. In: Proceedings of 2000 IEEE symposium on security and privacy, Oakland, California, 2000.
-
-
-
-
12
-
-
84948965481
-
-
Ritchey R, O'Berry B, Noel S. Representing TCP/IP connectivity for topological analysis of network security. In: Proceedings of 18th annual computer security applications conference, Las Vegas, Nevada, Dec 2002.
-
Ritchey R, O'Berry B, Noel S. Representing TCP/IP connectivity for topological analysis of network security. In: Proceedings of 18th annual computer security applications conference, Las Vegas, Nevada, Dec 2002.
-
-
-
-
13
-
-
0036083194
-
-
Sheyner O, Haines J, Jha S, Lippmann R, Wing J. Automated generation and analysis of attack graphs. In: Proceedings of 2002 IEEE symposium on security and privacy, Oakland, California, 2002.
-
Sheyner O, Haines J, Jha S, Lippmann R, Wing J. Automated generation and analysis of attack graphs. In: Proceedings of 2002 IEEE symposium on security and privacy, Oakland, California, 2002.
-
-
-
-
14
-
-
53049104619
-
-
http://www.snort.org, web page [accessed 18.10.07].
-
http://www.snort.org, web page [accessed 18.10.07].
-
-
-
-
15
-
-
53049104758
-
-
http://osvdb.org, web page [accessed 18.10.07].
-
http://osvdb.org, web page [accessed 18.10.07].
-
-
-
-
16
-
-
53049093376
-
-
http://oval.mitre.org, web page [accessed 18.10.07].
-
http://oval.mitre.org, web page [accessed 18.10.07].
-
-
-
-
17
-
-
53049092956
-
-
Wang L, Liu A, Jajodia S. An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts. In: Proceedings of the 10th European symposium on research in computer security application conference, 2004.
-
Wang L, Liu A, Jajodia S. An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alerts. In: Proceedings of the 10th European symposium on research in computer security application conference, 2004.
-
-
-
|