-
1
-
-
38149041613
-
-
Behrmann, G., Cougnard, A., David, A., Fleury, E., Larsen, K.G., Lime, D.: Uppaal-tiga: Time for playing games! In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, 4590, pp. 121-125. Springer, Heidelberg (2007)
-
Behrmann, G., Cougnard, A., David, A., Fleury, E., Larsen, K.G., Lime, D.: Uppaal-tiga: Time for playing games! In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 121-125. Springer, Heidelberg (2007)
-
-
-
-
3
-
-
56749136152
-
Network administrator and intruder strategies
-
Technical Report LSV-08-02, LSV, ENS Cachan January
-
Bursztein, E.: Network administrator and intruder strategies. Technical Report LSV-08-02, LSV, ENS Cachan (January 2008)
-
(2008)
-
-
Bursztein, E.1
-
4
-
-
38349000956
-
-
Bursztein, E., Goubault-Larrecq, J.: A logical framework for evaluating network resilience against faults and attacks. In: 12th annual Asian Computing Science Conference (ASIAN), December 2007, pp. 212-227. Springer, Heidelberg (2007)
-
Bursztein, E., Goubault-Larrecq, J.: A logical framework for evaluating network resilience against faults and attacks. In: 12th annual Asian Computing Science Conference (ASIAN), December 2007, pp. 212-227. Springer, Heidelberg (2007)
-
-
-
-
5
-
-
35248841407
-
The element of surprise in timed games
-
Amadio, R, Lugiez, D, eds, CONCUR 2003, Springer, Heidelberg
-
de Alfaro, L., Faella, M., Henzinger, T., Majumdar, R., Stoelinga, M.: The element of surprise in timed games. In: Amadio, R., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol. 2761, pp. 144-158. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2761
, pp. 144-158
-
-
de Alfaro, L.1
Faella, M.2
Henzinger, T.3
Majumdar, R.4
Stoelinga, M.5
-
6
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
Ramakrishan, C., Sekar, R.: Model-based analysis of configuration vulnerabilities. Journal of Computer Security 1, 198-209 (2002)
-
(2002)
Journal of Computer Security
, vol.1
, pp. 198-209
-
-
Ramakrishan, C.1
Sekar, R.2
-
7
-
-
0033718255
-
Using model checking to analyze network vulnerabilities
-
Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 156-165. IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 156-165
-
-
Ritchey, R.W.1
Ammann, P.2
-
8
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: SP 2002: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 273-284. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
SP 2002: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
|