메뉴 건너뛰기




Volumn , Issue , 2005, Pages 79-85

Incorporating attacker behavior in stochastic models of security

Author keywords

Attacker behavior; Game theory; Quantitative security; Stochastic modelling

Indexed keywords

ATTACKER BEHAVIOR; ILLUSTRATIVE EXAMPLES; OPERATIONAL SECURITIES; QUANTITATIVE SECURITY; RELIABILITY METHODOLOGIES; SECURITY EVALUATIONS; STOCHASTIC MODELLING; THREAT ENVIRONMENTS; TRANSITION RATE MATRIXES;

EID: 62349112614     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (16)
  • 11
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Sept/Oct
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25(5):633-650, Sept/Oct 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 12
    • 0004260006 scopus 로고
    • Academic Press, 2 edition
    • G. Owen. Game Theory. Academic Press, 2 edition, 1982.
    • (1982) Game Theory
    • Owen, G.1
  • 13
    • 0012109964 scopus 로고    scopus 로고
    • The Honeynet Project, Addison-Wesley, 2 edition
    • The Honeynet Project. Know Your Enemy. Addison-Wesley, 2 edition, 2004.
    • (2004) Know Your Enemy
  • 15
    • 1542330099 scopus 로고    scopus 로고
    • Probabilistic validation of an intrusion-tolerant replication system
    • de Bakker, J.W, de Roever, W.-P, and Rozenberg, G, editors, June
    • S. Singh, M. Cukier, and W.H. Sanders. Probabilistic validation of an intrusion-tolerant replication system. In de Bakker, J.W., de Roever, W.-P., and Rozenberg, G., editors, International Conference on Dependable Systems and Networks (DSN'03), June 2003.
    • (2003) International Conference on Dependable Systems and Networks (DSN'03)
    • Singh, S.1    Cukier, M.2    Sanders, W.H.3
  • 16
    • 27144505986 scopus 로고    scopus 로고
    • Security analysis of sitar intrusion tolerance system
    • D. Wang, B.B. Madan, and K.S. Trivedi. Security analysis of sitar intrusion tolerance system. ACM SSRS '03, 2003.
    • (2003) ACM SSRS '03
    • Wang, D.1    Madan, B.B.2    Trivedi, K.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.