메뉴 건너뛰기




Volumn , Issue , 2008, Pages 225-234

Host-centric model checking for network vulnerability analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMBINATORIAL EXPLOSIONS; FORMAL VERIFICATIONS; GRAPH-BASED; MODEL CHECKERS; MODELING APPROACHES; MONOTONICITY; NETWORK VULNERABILITIES; PROBLEM SPACES; QUADRATIC POLYNOMIALS; SCALABILITY PROBLEMS; TIME COMPLEXITY;

EID: 60649119575     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.15     Document Type: Conference Paper
Times cited : (31)

References (32)
  • 1
    • 0017983865 scopus 로고
    • Binary Decision Diagrams
    • Jun
    • Akers, S., "Binary Decision Diagrams," IEEE Trans. on Computers, vol. 27, no. 6, pp. 509-516, Jun., 1978.
    • (1978) IEEE Trans. on Computers , vol.27 , Issue.6 , pp. 509-516
    • Akers, S.1
  • 6
    • 0022769976 scopus 로고
    • Graph-Based Algorithms for Boolean Function Manipul-ation
    • Bryant, R. E., "Graph-Based Algorithms for Boolean Function Manipul-ation," Trans. on Computers, vol. C-35, no. 8, pp. 677-691, 1986.
    • (1986) Trans. on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 8
    • 79960396221 scopus 로고    scopus 로고
    • Bugtrag mailing list
    • Avail. on, Nov
    • Chasin S., "Bugtrag mailing list," Avail. on http://www.securityfocus.com/archive/1, Nov, 2007.
    • (2007)
    • Chasin, S.1
  • 9
    • 60649106116 scopus 로고    scopus 로고
    • CIAC - Computer Incident Advisory Capability, Avail. on http://www.ciac.org/ciac/index.html, Nov., 2007.
    • CIAC - Computer Incident Advisory Capability, Avail. on http://www.ciac.org/ciac/index.html, Nov., 2007.
  • 12
    • 0000289556 scopus 로고    scopus 로고
    • Formal methods: State of the art and future directions
    • Clarke, E. and J. Wing, "Formal methods: state of the art and future directions," Comp. Surveys, vol. 28, 1996.
    • (1996) Comp. Surveys , vol.28
    • Clarke, E.1    Wing, J.2
  • 15
    • 84886370421 scopus 로고    scopus 로고
    • Internet Security System
    • Avail. on, November
    • Klaus, C., "Internet Security System," Avail. on http://www.iss.net, November, 2007.
    • (2007)
    • Klaus, C.1
  • 21
    • 60649087493 scopus 로고    scopus 로고
    • McMillan, K., Symbolic Model Checking: An Approach to the State Explosion Problem, Ph.D. Diss., Carnegie Mellon U., Pittsburgh, PA, USA, 1992.
    • McMillan, K., "Symbolic Model Checking: An Approach to the State Explosion Problem," Ph.D. Diss., Carnegie Mellon U., Pittsburgh, PA, USA, 1992.
  • 22
    • 84893289705 scopus 로고    scopus 로고
    • NVD National Vulnerability Database
    • Avail. on, Nov
    • Mell, P., and T. Grance, "NVD National Vulnerability Database," Avail. on http://nvd.nist.gov, Nov., 2007.
    • (2007)
    • Mell, P.1    Grance, T.2
  • 31
    • 60649094680 scopus 로고    scopus 로고
    • The SMV (Symbolic Model Verifier) System, Avail. on http://www.cs.cmu. edu/~m-odelcheck/smv.html, 2007.
    • The SMV (Symbolic Model Verifier) System, Avail. on http://www.cs.cmu. edu/~m-odelcheck/smv.html, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.