메뉴 건너뛰기




Volumn , Issue , 2008, Pages 349-355

Combining defense graphs and enterprise architecture models for security analysis

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK GRAPHS; BAYESIAN STATISTICS; COUNTER-MEASURES; DECISION MAKERS; ENTERPRISE ARCHITECTURE MODELS; INFLUENCE DIAGRAMS; ORGANIZATIONAL POLICIES; RATIONAL DECISION MAKINGS; SECURITY ANALYSES; SECURITY ASSESSMENT FRAMEWORKS; SECURITY ASSESSMENTS; SECURITY PROCEDURES; TECHNICAL COUNTERMEASURES;

EID: 56649088314     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EDOC.2008.37     Document Type: Conference Paper
Times cited : (24)

References (25)
  • 1
    • 56649109395 scopus 로고    scopus 로고
    • Network vulnerability assessment using Bayesian networks
    • Information assurance and Data networks security, Orlando, Florida, USA, pp
    • Y. Liu and M. Hong, Network vulnerability assessment using Bayesian networks, Proceedings of Data Mining, Intrusion detection, Information assurance and Data networks security, Orlando, Florida, USA, 2005, pp
    • (2005) Proceedings of Data Mining, Intrusion detection
    • Liu, Y.1    Hong, M.2
  • 4
    • 34250193990 scopus 로고    scopus 로고
    • Enterprise Architecture Analysis with Extended Influence Diagrams
    • Springer Netherlands
    • P. Johnson, R. Lagerstrom, P. Narman, M. Simonsson., Enterprise Architecture Analysis with Extended Influence Diagrams. Information System Frontiers, 9(2), Springer Netherlands, 2007, pp. 163-180.
    • (2007) Information System Frontiers , vol.9 , Issue.2 , pp. 163-180
    • Johnson, P.1    Lagerstrom, R.2    Narman, P.3    Simonsson, M.4
  • 5
    • 0022818911 scopus 로고
    • Evaluating influence diagrams
    • Institute for Operations Research and the Management Sciences, Hanover Maryland
    • R. Shachter, Evaluating influence diagrams. Operations Research, 34(6), Institute for Operations Research and the Management Sciences, Hanover Maryland, 1986, pp. 871-882.
    • (1986) Operations Research , vol.34 , Issue.6 , pp. 871-882
    • Shachter, R.1
  • 6
    • 33749596111 scopus 로고    scopus 로고
    • Influence Diagrams
    • Institute for Operations Research and the Management Sciences, Hanover Maryland
    • R.A Howard, J.E. Matheson, Influence Diagrams. Decision Analysis, 2(3), Institute for Operations Research and the Management Sciences, Hanover Maryland, 2005, pp. 127-143.
    • (2005) Decision Analysis , vol.2 , Issue.3 , pp. 127-143
    • Howard, R.A.1    Matheson, J.E.2
  • 7
  • 15
    • 56649083236 scopus 로고    scopus 로고
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, 1999.
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, 1999.
  • 18
    • 17744373483 scopus 로고    scopus 로고
    • Scenario Graphs and Attack Graphs,
    • Carnegie Mellon University, April, PhD Thesis
    • O. Sheyner "Scenario Graphs and Attack Graphs," Carnegie Mellon University, April 2004. PhD Thesis.
    • (2004)
    • Sheyner, O.1
  • 20
    • 33751084118 scopus 로고    scopus 로고
    • Expected benefits of information security investments
    • J.J.C.H. Ryan and D.J. Ryan, Expected benefits of information security investments, Computers & Security, 25(8), 2006, pp 579-588.
    • (2006) Computers & Security , vol.25 , Issue.8 , pp. 579-588
    • Ryan, J.J.C.H.1    Ryan, D.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.