메뉴 건너뛰기




Volumn 1, Issue 5, 2006, Pages 31-42

On stochastic modeling for integrated security and dependability evaluation

Author keywords

Game theory; Integrating security and dependability; Security measures; Stochastic models

Indexed keywords

GAME THEORY; NETWORK SECURITY; STOCHASTIC SYSTEMS;

EID: 60449090394     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.1.5.31-42     Document Type: Article
Times cited : (58)

References (26)
  • 9
    • 0014873273 scopus 로고
    • Markov approach to finding failure times of repairable systems
    • November
    • J. A. Buzacott, "Markov approach to finding failure times of repairable systems," IEEE Transactions on Reliability, vol. 19, pp. 128-134, November 1970.
    • (1970) IEEE Transactions On Reliability , vol.19 , pp. 128-134
    • Buzacott, J.A.1
  • 10
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • E. Jonsson and T. Olovsson, "A quantitative model of the security intrusion process based on attacker behavior," IEEE Transactions of Software Engineering, vol. 23, no. 4, pp. 235-245, April 1997.
    • (1997) IEEE Transactions of Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 12
    • 0004260006 scopus 로고    scopus 로고
    • 3rd ed. Academic Press
    • G. Owen, Game Theory, 3rd ed. Academic Press, 2001.
    • (2001) Game Theory
    • Owen, G.1
  • 18
    • 84871587707 scopus 로고    scopus 로고
    • The development of a meaningful hacker taxonomy: A two dimensional approach
    • Tech. Rep
    • "The development of a meaningful hacker taxonomy: A two dimensional approach," CERIAS Tech Report 2005-2043, Tech. Rep., 2005.
    • (2005) CERIAS Tech Report , pp. 2005-2043
  • 20
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Sept/Oct
    • R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with quantitative evaluation tools for monitoring operational security," IEEE Transactions on Software Engineering, vol. 25, no. 5, pp. 633-650, Sept/Oct 1999.
    • (1999) IEEE Transactions On Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 22
    • 1042277255 scopus 로고    scopus 로고
    • A method for modeling and quantifying the security attributes of intrusion tolerant systems
    • K. B. B. Madan, K. V. Goseva-Popstojanova, and K. S. Trivedi, "A method for modeling and quantifying the security attributes of intrusion tolerant systems," in Performance Evaluation, vol. 56, 2004.
    • (2004) Performance Evaluation , vol.56
    • Madan, K.B.B.1    Goseva-Popstojanova, K.V.2    Trivedi, K.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.