-
1
-
-
33846269000
-
a host based approach to network attack chaining analysis
-
IEEE Computer Society, Tucson, Arizona, December 5-9
-
st Annual Computer Security Applications Conference (ACSAC '05), IEEE Computer Society, Tucson, Arizona, December 5-9, 2005, pp. 10.
-
(2005)
st Annual Computer Security Applications Conference (ACSAC '05)
, pp. 10
-
-
Ammann, P.1
Pamula, J.2
Ritchey, R.3
Street, J.4
-
2
-
-
0038687692
-
scalable, graph-based network vulnerability analysis
-
Washington, USA, November 18-22
-
th ACM Conference on Computer and Communications Security (CCS), ACM Press, Washington, USA, November 18-22,2002, pp. 217-224.
-
(2002)
th ACM Conference on Computer and Communications Security (CCS), ACM Press
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
3
-
-
39049104457
-
practical attack graph generation for network defense
-
IEEE Computer Society, Miami Beach, Florida, December 10-14
-
K. Ingols, R. Lippmann, and K. Piowarski, "practical attack graph generation for network defense", In Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 06), IEEE Computer Society, Miami Beach, Florida, December 10-14, 2006, pp. 121-130.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 06)
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piowarski, K.3
-
4
-
-
30644476485
-
topological analysis of network attack vulnerability
-
Springer
-
S. Jajodia, S. Noel, and B. O'Berry, "topological analysis of network attack vulnerability", Managing Cyber Threats: Issues, Approaches and Challenges, Springer, 2005.
-
(2005)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
5
-
-
84948760464
-
two formal analyses of attack graphs
-
IEEE Computer Society, Nova Scotia, Canada, June 24-26
-
th IEEE Computer Security Foundations Workshop (CSFW '02), IEEE Computer Society, Nova Scotia, Canada, June 24-26, 2002, pp. 49-63.
-
(2002)
th IEEE Computer Security Foundations Workshop (CSFW '02)
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
6
-
-
42549172759
-
cluster security research involving the modeling of network exploitations using exploitation graphs
-
IEEE Computer Society, Singapore, May 16-19
-
th IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06), IEEE Computer Society, Singapore, May 16-19, 2006, pp. 26.
-
(2006)
th IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06)
, pp. 26
-
-
Li, W.1
Vaughn, R.B.2
-
7
-
-
0036083194
-
automated generation and analysis of attack graphs
-
IEEE Computer Society, California, USA, May 12-15
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, "automated generation and analysis of attack graphs", In Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, California, USA, May 12-15, 2002, pp. 273-284.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
8
-
-
20444480299
-
managing attack graph complexity through visual hierarchical aggregation
-
VA, USA, October 29
-
S. Noel, and S. Jajodia, "managing attack graph complexity through visual hierarchical aggregation", In Proceedings of the ACM workshop on Visualization and data mining for computer security (VizSEC/DMSEC '04), ACM, VA, USA, October 29, 2004, pp. 109-118.
-
(2004)
Proceedings of the ACM workshop on Visualization and data mining for computer security (VizSEC/DMSEC '04), ACM
, pp. 109-118
-
-
Noel, S.1
Jajodia, S.2
-
9
-
-
34047168454
-
-
Technical report, MIT Lincoln Laboratory, Lexington, MA, web
-
R. P. Lippmann, and K. W. Ingols, "an annotated review of past papers on attack graphs", Technical report, MIT Lincoln Laboratory, Lexington, MA, 2005. web: www.ll.mit.edu/IST/pubs/0502-Lippmann.pdf.
-
(2005)
an annotated review of past papers on attack graphs
-
-
Lippmann, R.P.1
Ingols, K.W.2
|