-
1
-
-
0017983865
-
Binary Decision Diagrams
-
Jun
-
Akers, S., "Binary Decision Diagrams," IEEE Trans. on Computers, vol. 27, no. 6, pp. 509-516, Jun., 1978.
-
(1978)
IEEE Trans. on Computers
, vol.27
, Issue.6
, pp. 509-516
-
-
Akers, S.1
-
3
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Ammann, P., D. Wijesekera, and S. Kaushik, "Scalable, graph-based network vulnerability analysis," Proc. of ACM conf. on Comp. & Com. Sec., pp. 217-224, 2002.
-
(2002)
Proc. of ACM conf. on Comp. & Com. Sec
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
4
-
-
0032630134
-
Symbolic model checking using SAT procedures instead of BDDs
-
Biere, A., E. Cimtti, E. Clarke, M. Fujita, and Y. Zhu, "Symbolic model checking using SAT procedures instead of BDDs," Proc. of conf. on Design Automation, pp. 317-320, 1999.
-
(1999)
Proc. of conf. on Design Automation
, pp. 317-320
-
-
Biere, A.1
Cimtti, E.2
Clarke, E.3
Fujita, M.4
Zhu, Y.5
-
5
-
-
85164875567
-
-
Syngress Pub
-
Beale, J., R. Deraison, H. Meer, R. Temingh, and C. Walt, Nessus Network Auditing. Syngress Pub., 2004.
-
(2004)
Nessus Network Auditing
-
-
Beale, J.1
Deraison, R.2
Meer, H.3
Temingh, R.4
Walt, C.5
-
6
-
-
0022769976
-
Graph-Based Algorithms for Boolean Function Manipul-ation
-
Bryant, R. E., "Graph-Based Algorithms for Boolean Function Manipul-ation," Trans. on Computers, vol. C-35, no. 8, pp. 677-691, 1986.
-
(1986)
Trans. on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
7
-
-
0025595038
-
20 states and beyond
-
90, pp
-
20 states and beyond," Proc. of IEEE Symp. on Logic in Computer Science, LICS '90, pp. 428-439, 1990.
-
(1990)
Proc. of IEEE Symp. on Logic in Computer Science, LICS
, pp. 428-439
-
-
Burch, J.1
Clarke, E.2
McMillan, K.3
Dill, D.4
Hwang, L.5
-
8
-
-
79960396221
-
Bugtrag mailing list
-
Avail. on, Nov
-
Chasin S., "Bugtrag mailing list," Avail. on http://www.securityfocus.com/archive/1, Nov, 2007.
-
(2007)
-
-
Chasin, S.1
-
9
-
-
60649106116
-
-
CIAC - Computer Incident Advisory Capability, Avail. on http://www.ciac.org/ciac/index.html, Nov., 2007.
-
CIAC - Computer Incident Advisory Capability, Avail. on http://www.ciac.org/ciac/index.html, Nov., 2007.
-
-
-
-
10
-
-
0242416218
-
NuSMV 2: An OpenSource Tool for Symbolic Model Checking
-
Cimatti, A., E. Clarke, E. Giunchiglia, F. Giunchiglia, M. Pistore, M. Roveri, R. Sebastiani, and A. Tacchella, "NuSMV 2: An OpenSource Tool for Symbolic Model Checking," Proc. of Conf. on Comp. Aided Verif., 2002.
-
(2002)
Proc. of Conf. on Comp. Aided Verif
-
-
Cimatti, A.1
Clarke, E.2
Giunchiglia, E.3
Giunchiglia, F.4
Pistore, M.5
Roveri, M.6
Sebastiani, R.7
Tacchella, A.8
-
12
-
-
0000289556
-
Formal methods: State of the art and future directions
-
Clarke, E. and J. Wing, "Formal methods: state of the art and future directions," Comp. Surveys, vol. 28, 1996.
-
(1996)
Comp. Surveys
, vol.28
-
-
Clarke, E.1
Wing, J.2
-
13
-
-
0028513196
-
Model checking and abstraction
-
Clarke, E., O. Grumberg, and D. Long, "Model checking and abstraction," ACM Trans. Prog. Lang. Syst., vol. 16, 1994.
-
(1994)
ACM Trans. Prog. Lang. Syst
, vol.16
-
-
Clarke, E.1
Grumberg, O.2
Long, D.3
-
15
-
-
84886370421
-
Internet Security System
-
Avail. on, November
-
Klaus, C., "Internet Security System," Avail. on http://www.iss.net, November, 2007.
-
(2007)
-
-
Klaus, C.1
-
16
-
-
30644476485
-
Topological Analysis of Network Attack Vulnerability
-
Springer
-
Jajodia, S., S. Noel, and B. O'Berry, "Topological Analysis of Network Attack Vulnerability," Managing Cyber Threats: Issues, Approaches and Challenges, Springer 2005.
-
(2005)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
17
-
-
84948760464
-
Two formal analyses of attack graphs
-
Jha, S., O. Sheyner, and J. Wing, "Two formal analyses of attack graphs," Proceedings of the 15th IEEE Computer Security Foundations Workshop, pp. 49-63, 2002.
-
(2002)
Proceedings of the 15th IEEE Computer Security Foundations Workshop
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
18
-
-
39049104457
-
Practical Attack Graph Generation for Network Defense
-
Ingols, K., R. Lippmann, and K. Piwowarski, "Practical Attack Graph Generation for Network Defense," Proc. of Comp. Sec. App. Conf., pp. 121-130, 2006.
-
(2006)
Proc. of Comp. Sec. App. Conf
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
20
-
-
35148844598
-
Validating and Restoring Defense in Depth Using Attack Graphs
-
Lippmann, R., K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham, "Validating and Restoring Defense in Depth Using Attack Graphs," Proc. of the Military Com. Conf., pp. 1-10, 2006.
-
(2006)
Proc. of the Military Com. Conf
, pp. 1-10
-
-
Lippmann, R.1
Ingols, K.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
21
-
-
60649087493
-
-
McMillan, K., Symbolic Model Checking: An Approach to the State Explosion Problem, Ph.D. Diss., Carnegie Mellon U., Pittsburgh, PA, USA, 1992.
-
McMillan, K., "Symbolic Model Checking: An Approach to the State Explosion Problem," Ph.D. Diss., Carnegie Mellon U., Pittsburgh, PA, USA, 1992.
-
-
-
-
22
-
-
84893289705
-
NVD National Vulnerability Database
-
Avail. on, Nov
-
Mell, P., and T. Grance, "NVD National Vulnerability Database," Avail. on http://nvd.nist.gov, Nov., 2007.
-
(2007)
-
-
Mell, P.1
Grance, T.2
-
24
-
-
34547239511
-
A scalable approach to attack graph generation
-
Ou, X., W. Boyer, and M. McQueen, "A scalable approach to attack graph generation," Proc. of ACM conf. on Comp. and Com. Security, pp. 336-345, 2006.
-
(2006)
Proc. of ACM conf. on Comp. and Com. Security
, pp. 336-345
-
-
Ou, X.1
Boyer, W.2
McQueen, M.3
-
28
-
-
9444298254
-
-
King's College Pub, London, pp
-
Schnoebelen, P., The complexity of temporal logic model checking, Advanced in Modal Logic, vol. 4, King's College Pub., London, pp. 393-436, 2003.
-
(2003)
The complexity of temporal logic model checking, Advanced in Modal Logic
, vol.4
, pp. 393-436
-
-
Schnoebelen, P.1
-
30
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Sheyner, O., J. Haines, S. Jha, R. Lippmann, and J. Wing, "Automated generation and analysis of attack graphs," Proc. of the IEEE Symposium on Security and Privacy, pp. 273-284, 2002.
-
(2002)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
31
-
-
60649094680
-
-
The SMV (Symbolic Model Verifier) System, Avail. on http://www.cs.cmu. edu/~m-odelcheck/smv.html, 2007.
-
The SMV (Symbolic Model Verifier) System, Avail. on http://www.cs.cmu. edu/~m-odelcheck/smv.html, 2007.
-
-
-
-
32
-
-
84964504906
-
Computer- attack graph generation tool
-
Swiler, L., C. Phillips, D. Ellis, and S. Chakerian, "Computer- attack graph generation tool," Proc. DARPA Info. Surv. Conf. & Expo. II, vol. 2, pp. 307-321, 2001.
-
(2001)
Proc. DARPA Info. Surv. Conf. & Expo. II
, vol.2
, pp. 307-321
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
|