-
1
-
-
56649109395
-
Network vulnerability assessment using Bayesian networks
-
Information assurance and Data networks security, Orlando, Florida, USA, pp
-
Y. Liu and M. Hong, Network vulnerability assessment using Bayesian networks, Proceedings of Data Mining, Intrusion detection, Information assurance and Data networks security, Orlando, Florida, USA, 2005, pp
-
(2005)
Proceedings of Data Mining, Intrusion detection
-
-
Liu, Y.1
Hong, M.2
-
2
-
-
33750958509
-
Defense trees for economic evaluation of security investments
-
Vienna, Austria
-
S. Bistarelli, F. Fioravanti, P. Peretti, Defense trees for economic evaluation of security investments, Proceedings of Availability, Reliability and Security (ARES), Vienna, Austria, 2006, pp. 8.
-
(2006)
Proceedings of Availability, Reliability and Security (ARES)
, pp. 8
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
3
-
-
35248812867
-
Using CP-nets as a Guide for Countermeasure Selection
-
Seoul, Korea
-
S. Bistarelli, F. Fioravanti, P. Peretti, Using CP-nets as a Guide for Countermeasure Selection, Proceedings of the 2007 ACM symposium on Applied computing, Seoul, Korea, 2007.
-
(2007)
Proceedings of the 2007 ACM symposium on Applied computing
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
4
-
-
34250193990
-
Enterprise Architecture Analysis with Extended Influence Diagrams
-
Springer Netherlands
-
P. Johnson, R. Lagerstrom, P. Narman, M. Simonsson., Enterprise Architecture Analysis with Extended Influence Diagrams. Information System Frontiers, 9(2), Springer Netherlands, 2007, pp. 163-180.
-
(2007)
Information System Frontiers
, vol.9
, Issue.2
, pp. 163-180
-
-
Johnson, P.1
Lagerstrom, R.2
Narman, P.3
Simonsson, M.4
-
5
-
-
0022818911
-
Evaluating influence diagrams
-
Institute for Operations Research and the Management Sciences, Hanover Maryland
-
R. Shachter, Evaluating influence diagrams. Operations Research, 34(6), Institute for Operations Research and the Management Sciences, Hanover Maryland, 1986, pp. 871-882.
-
(1986)
Operations Research
, vol.34
, Issue.6
, pp. 871-882
-
-
Shachter, R.1
-
6
-
-
33749596111
-
Influence Diagrams
-
Institute for Operations Research and the Management Sciences, Hanover Maryland
-
R.A Howard, J.E. Matheson, Influence Diagrams. Decision Analysis, 2(3), Institute for Operations Research and the Management Sciences, Hanover Maryland, 2005, pp. 127-143.
-
(2005)
Decision Analysis
, vol.2
, Issue.3
, pp. 127-143
-
-
Howard, R.A.1
Matheson, J.E.2
-
7
-
-
0344080086
-
-
Prentice-Hall, Inc. Upper Saddle River, NJ, USA
-
Neapolitan, R. Learning Bayesian Networks. Prentice-Hall, Inc. Upper Saddle River, NJ, USA 2003.
-
(2003)
Learning Bayesian Networks
-
-
Neapolitan, R.1
-
8
-
-
0003448310
-
-
Springer New York, Secaucus, NJ, USA
-
Jensen, F.V., Bayesian Networks and Decision Graphs, Springer New York, Secaucus, NJ, USA 2001.
-
(2001)
Bayesian Networks and Decision Graphs
-
-
Jensen, F.V.1
-
9
-
-
47949098033
-
Extended Influence Diagram Generation
-
Springer London
-
P. Johnson, Lagerström, R., Närman, P.: Extended Influence Diagram Generation. Enterprise Interoperability II - New Challenges and Approaches, Springer London, 2007, pp. 599-602.
-
(2007)
Enterprise Interoperability II - New Challenges and Approaches
, pp. 599-602
-
-
Johnson, P.1
Lagerström, R.2
Närman, P.3
-
10
-
-
0024038570
-
-
Operations Research, Hanover Maryland
-
R. Shachter, Probabilistic inference and influence diagrams. Operations Research, 36(4), Hanover Maryland, 1988, pp. 36-40.
-
(1988)
Probabilistic inference and influence diagrams
, vol.36
, Issue.4
, pp. 36-40
-
-
Shachter, R.1
-
12
-
-
85008015613
-
Building probabilistic networks: Where do the numbers come from?
-
M.J. Druzdzel and L.C. van der Gaag, Building probabilistic networks: where do the numbers come from?, IEEE Transactions on Knowledge Data Engineering, 12(4), 2000, pp. 481-6.
-
(2000)
IEEE Transactions on Knowledge Data Engineering
, vol.12
, Issue.4
, pp. 481-486
-
-
Druzdzel, M.J.1
van der Gaag, L.C.2
-
13
-
-
0010729284
-
-
Microsoft Press, Redmond, WA, USA
-
M. Howard and D. C. LeBlanc. Writing Secure Code, Microsoft Press, Redmond, WA, USA, 2002.
-
(2002)
Writing Secure Code
-
-
Howard, M.1
LeBlanc, D.C.2
-
15
-
-
56649083236
-
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, 1999.
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, 1999.
-
-
-
-
18
-
-
17744373483
-
Scenario Graphs and Attack Graphs,
-
Carnegie Mellon University, April, PhD Thesis
-
O. Sheyner "Scenario Graphs and Attack Graphs," Carnegie Mellon University, April 2004. PhD Thesis.
-
(2004)
-
-
Sheyner, O.1
-
20
-
-
33751084118
-
Expected benefits of information security investments
-
J.J.C.H. Ryan and D.J. Ryan, Expected benefits of information security investments, Computers & Security, 25(8), 2006, pp 579-588.
-
(2006)
Computers & Security
, vol.25
, Issue.8
, pp. 579-588
-
-
Ryan, J.J.C.H.1
Ryan, D.J.2
-
23
-
-
38049144769
-
Strategic games on defense trees
-
Springer Berlin, Heidelberg
-
S. Bistarelli, M. Dall'Aglio, P. Peretti, "Strategic games on defense trees", Formal Aspects in Security and Trust, Springer Berlin / Heidelberg, 2007, pp. 1-15.
-
(2007)
Formal Aspects in Security and Trust
, pp. 1-15
-
-
Bistarelli, S.1
Dall'Aglio, M.2
Peretti, P.3
-
24
-
-
0038687692
-
Scalable graph-based vulnerability analysis
-
Washington, DC, November
-
th ACM Conference on Computer and Communications Security (CCS '02), pages 217-224, Washington, DC, November 2002.
-
(2002)
th ACM Conference on Computer and Communications Security (CCS '02)
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
|