메뉴 건너뛰기




Volumn , Issue , 2008, Pages 93-98

Threat modeling revisited: Improving expressiveness of attack

Author keywords

Attack centric; Expressiveness; Petri nets; Semantics; Threat net; Threat centric

Indexed keywords

ANALYSIS THEORIES; ATTACK-CENTRIC; DEFENSE CAPABILITIES; EXPECTED VALUES; EXPRESSIVENESS; OPTIMAL SECURITIES; RANDOM EVENTS; SECURITY EXPERTS; THREAT MODELING; THREAT MODELS; THREAT NET; THREAT-CENTRIC;

EID: 55849125795     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EMS.2008.83     Document Type: Conference Paper
Times cited : (14)

References (14)
  • 2
    • 55849131547 scopus 로고    scopus 로고
    • FaultTree Org. Fault tree analysis tool, Jan 2008.
    • FaultTree Org. Fault tree analysis tool, Jan 2008.
  • 3
    • 55849117841 scopus 로고    scopus 로고
    • H. Guo and W. Hsu. A survey on algorithms for real-time bayesian network inference. In In the joint AAAI-02/KDD-02/UAI-02 workshop on Real-Time Decision Support and Diagnosis Systems, Edmonton, Alberta, Canada, 2002.
    • H. Guo and W. Hsu. A survey on algorithms for real-time bayesian network inference. In In the joint AAAI-02/KDD-02/UAI-02 workshop on Real-Time Decision Support and Diagnosis Systems, Edmonton, Alberta, Canada, 2002.
  • 7
    • 55849106033 scopus 로고    scopus 로고
    • OWS Project, October
    • OWS Project. Threat risk modeling, October 2007.
    • (2007) Threat risk modeling
  • 9
    • 0005943436 scopus 로고    scopus 로고
    • Modeling security threats: Attack trees
    • December
    • B. Schneier. Modeling security threats: Attack trees. Dr. Dobb's Journal, pages 1-9, December 1999.
    • (1999) Dr. Dobb's Journal , pp. 1-9
    • Schneier, B.1
  • 12
    • 33745849657 scopus 로고    scopus 로고
    • Foundations of attack trees
    • D. Won and S. Kim, editors, 8th Annual International Conference on Information Security and Cryptology, ICISC'05, number in, Springer
    • M. Sjouke and O. Martijn. Foundations of attack trees. In D. Won and S. Kim, editors, 8th Annual International Conference on Information Security and Cryptology, ICISC'05, number 3935 in LNCS, pages 186-198. Springer, 2006.
    • (2006) LNCS , vol.3935 , pp. 186-198
    • Sjouke, M.1    Martijn, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.