-
2
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
January-March
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 11-33, January-March 2004.
-
(2004)
IEEE Transactions On Dependable and Secure Computing
, vol.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
6
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
January-March
-
D. M. Nicol, W. H. Sanders, and K. S. Trivedi, "Model-based evaluation: From dependability to security," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 48-65, January-March 2004.
-
(2004)
IEEE Transactions On Dependable and Secure Computing
, vol.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
8
-
-
71749084566
-
-
draft lecture notes, Department of Telematics, NTNU, Nov
-
B. E. Helvik, Dependable Computing Systems and Communication Networks, Design and Evaluation, draft lecture notes (256 p.), Department of Telematics, NTNU, Nov. 2003.
-
(2003)
Dependable Computing Systems and Communication Networks
, pp. 256
-
-
Helvik, B.E.1
-
9
-
-
0014873273
-
Markov approach to finding failure times of repairable systems
-
November
-
J. A. Buzacott, "Markov approach to finding failure times of repairable systems," IEEE Transactions on Reliability, vol. 19, pp. 128-134, November 1970.
-
(1970)
IEEE Transactions On Reliability
, vol.19
, pp. 128-134
-
-
Buzacott, J.A.1
-
10
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
E. Jonsson and T. Olovsson, "A quantitative model of the security intrusion process based on attacker behavior," IEEE Transactions of Software Engineering, vol. 23, no. 4, pp. 235-245, April 1997.
-
(1997)
IEEE Transactions of Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
12
-
-
0004260006
-
-
3rd ed. Academic Press
-
G. Owen, Game Theory, 3rd ed. Academic Press, 2001.
-
(2001)
Game Theory
-
-
Owen, G.1
-
13
-
-
14844293542
-
Game strategies in network security
-
K. Lye and J. M. Wing, "Game strategies in network security," International Journal of Information Security, vol. 4, no. 1-2, pp. 71-86, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 71-86
-
-
Lye, K.1
Wing, J.M.2
-
15
-
-
14344258545
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
P. Liu and W. Zang, "Incentive-based modeling and inference of attacker intent, objectives, and strategies," in Proceedings of the 10th ACM conference on computer and communication security, 2003, pp. 179-189.
-
(2003)
Proceedings of the 10th ACM Conference On Computer and Communication Security
, pp. 179-189
-
-
Liu, P.1
Zang, W.2
-
18
-
-
84871587707
-
The development of a meaningful hacker taxonomy: A two dimensional approach
-
Tech. Rep
-
"The development of a meaningful hacker taxonomy: A two dimensional approach," CERIAS Tech Report 2005-2043, Tech. Rep., 2005.
-
(2005)
CERIAS Tech Report
, pp. 2005-2043
-
-
-
20
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Sept/Oct
-
R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with quantitative evaluation tools for monitoring operational security," IEEE Transactions on Software Engineering, vol. 25, no. 5, pp. 633-650, Sept/Oct 1999.
-
(1999)
IEEE Transactions On Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
21
-
-
84974774507
-
Towards operational measures of computer security
-
Oct
-
B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, McDermid J., and D. Goll-mann, "Towards operational measures of computer security," Journal of Computer Security, vol. 2, pp. 211-229, Oct 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 211-229
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Goll-Mann, D.9
-
22
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
K. B. B. Madan, K. V. Goseva-Popstojanova, and K. S. Trivedi, "A method for modeling and quantifying the security attributes of intrusion tolerant systems," in Performance Evaluation, vol. 56, 2004.
-
(2004)
Performance Evaluation
, vol.56
-
-
Madan, K.B.B.1
Goseva-Popstojanova, K.V.2
Trivedi, K.S.3
-
23
-
-
16244368460
-
Model-based validation of an intrusion-tolerant information system
-
F. Stevens, T. Courtney, S. Singh, A. Agbaria, J. F. Meyer, W. H. Sanders, and P. Pal, "Model-based validation of an intrusion-tolerant information system," in Proceedings of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004), Oct 18-20 2004.
-
(2004)
Proceedings of the 23rd Symposium On Reliable Distributed Systems (SRDS 2004)
, pp. 18-20
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Meyer, J.F.5
Sanders, W.H.6
Pal, P.7
-
24
-
-
33750944742
-
Towards a stochastic model for integrated security and dependability evaluation
-
K. Sallhammar, B. E. Helvik, and S. J. Knapskog, "Towards a stochastic model for integrated security and dependability evaluation," in Proceedings of the First International Comference on Availability, Reliability and Security (AReS), 2006.
-
(2006)
Proceedings of the First International Comference On Availability, Reliability and Security (AReS)
-
-
Sallhammar, K.1
Helvik, B.E.2
Knapskog, S.J.3
-
26
-
-
33750366274
-
Real-time Risk Assessment with Network Sensors and Intrusion Detection Systems
-
Dec
-
A. A rnes, K. Sallhammar, K. Haslum, T. Brekne, M. E. G. Moe, and S. J. Knapskog, "Real-time Risk Assessment with Network Sensors and Intrusion Detection Systems," in International Conference on Computational Intelligence and Security (CIS), Dec 2005.
-
(2005)
International Conference On Computational Intelligence and Security (CIS)
-
-
Rnes, A.A.1
Sallhammar, K.2
Haslum, K.3
Brekne, T.4
Moe, M.E.G.5
Knapskog, S.J.6
|