-
1
-
-
0024631953
-
What you always wanted to know about Datalog (and never dared to ask)
-
Stefano Ceri, Georg Gottlob, and Letizia Tanca. What you always wanted to know about Datalog (and never dared to ask). IEEE Trans. Knowledge Data Eng., 1(1):146-166, 1989.
-
(1989)
IEEE Trans. Knowledge Data Eng
, vol.1
, Issue.1
, pp. 146-166
-
-
Ceri, S.1
Gottlob, G.2
Tanca, L.3
-
4
-
-
33749564382
-
On solving the partial MAX-SAT problem
-
Armin Biere and Carla P. Gomes, editors
-
Zhaohui Fu and Sharad Malik. On solving the partial MAX-SAT problem. In Armin Biere and Carla P. Gomes, editors, Proc. Theory Applications Satisfiability Testing - SAT 2006, pages 252-265, 2006.
-
(2006)
Proc. Theory Applications Satisfiability Testing - SAT
, pp. 252-265
-
-
Fu, Z.1
Malik, S.2
-
5
-
-
46149116824
-
Solving the Minimum-Cost Satisfiability problem using SAT based branch and bound search
-
San Jose, CA, USA
-
Zhaohui Fu and Sharad Malik. Solving the Minimum-Cost Satisfiability problem using SAT based branch and bound search. In Proc.International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 2006.
-
(2006)
Proc.International Conference on Computer-Aided Design (ICCAD)
-
-
Fu, Z.1
Malik, S.2
-
6
-
-
39049104457
-
Practical attack graph generation for network defense
-
Miami Beach, Florida, December
-
Kyle Ingols, Richard Lippmann, and Keith Piwowarski. Practical attack graph generation for network defense. In 22nd Annual Computer Security Applications Conference (ACSAC), Miami Beach, Florida, December 2006.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC)
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
7
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
V. Kumar, J. Srivastava, and A. Lazarevic, editors, chapter 5. Kluwer Academic Publisher
-
Sushil Jajodia, Steven Noel, and Brian O'Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challanges, chapter 5. Kluwer Academic Publisher, 2003.
-
(2003)
Managing Cyber Threats: Issues, Approaches and Challanges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
8
-
-
84948760464
-
Two formal analyses of attack graphs
-
Nova Scotia, Canada, June
-
Somesh Jha, Oleg Sheyner, and Jeannette M.Wing. Two formal analyses of attack graphs. In Proc.15th IEEE Computer Security Foundations Workshop, pages 49-63, Nova Scotia, Canada, June 2002.
-
(2002)
Proc.15th IEEE Computer Security Foundations Workshop
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.M.3
-
9
-
-
64249165645
-
-
Xiao Yu Li. Optimization Algorithms for the Minimum-Cost Satisfiability Problem. PhD thesis, North Carolina State University, Raleigh, North Carolina, 2004.
-
Xiao Yu Li. Optimization Algorithms for the Minimum-Cost Satisfiability Problem. PhD thesis, North Carolina State University, Raleigh, North Carolina, 2004.
-
-
-
-
10
-
-
35148844598
-
Validating and restoring defense in depth using attack graphs
-
Washington, DC, U.S.A, October
-
Richard Lippmann, Kyle Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Mike Artz, and Robert Cunningham. Validating and restoring defense in depth using attack graphs. In Military Communications Conference (MILCOM), Washington, DC, U.S.A., October 2006.
-
(2006)
Military Communications Conference (MILCOM)
-
-
Lippmann, R.1
Ingols, K.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
11
-
-
34047168454
-
An annotated review of past papers on attack graphs
-
Technical report, MIT Lincoln Laboratory, March
-
Richard Lippmann and Kyle W. Ingols. An annotated review of past papers on attack graphs. Technical report, MIT Lincoln Laboratory, March 2005.
-
(2005)
-
-
Lippmann, R.1
Ingols, K.W.2
-
12
-
-
64249101522
-
-
Evaluating and strengthening enterprise network security using attack graphs. Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, October
-
Richard P. Lippmann, Kyle W. Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Michael Artz, and Robert Cunningham. Evaluating and strengthening enterprise network security using attack graphs. Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, October 2005.
-
(2005)
-
-
Lippmann, R.P.1
Ingols, K.W.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
13
-
-
26444568158
-
-
Yogesh S. Mahajan, Zhaohui Fu, and Sharad Malik. Zchaff2004: An efficient SAT solver. In Lecture Notes in Computer Science SAT 2004 Special pages 360-375. LNCS 3542, 2004.
-
Yogesh S. Mahajan, Zhaohui Fu, and Sharad Malik. Zchaff2004: An efficient SAT solver. In Lecture Notes in Computer Science SAT 2004 Special Volume, pages 360-375. LNCS 3542, 2004.
-
-
-
-
14
-
-
0036576020
-
-
Vasco M. Manquinho and Jo ao P. Marques-Silva. Search pruning techniques in SAT-based branch-and-bound algorithmsfor the binate covering problem. IEEE Trans. Computer-Aided Design, 21:505-516, 2002.
-
Vasco M. Manquinho and Jo ao P. Marques-Silva. Search pruning techniques in SAT-based branch-and-bound algorithmsfor the binate covering problem. IEEE Trans. Computer-Aided Design, 21:505-516, 2002.
-
-
-
-
15
-
-
38149024063
-
Ranking attack graphs
-
September
-
Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund Clarke, and Jeannette Wing. Ranking attack graphs. In Proc. Recent Advances in Intrusion Detection (RAID), September 2006.
-
(2006)
Proc. Recent Advances in Intrusion Detection (RAID)
-
-
Mehta, V.1
Bartzis, C.2
Zhu, H.3
Clarke, E.4
Wing, J.5
-
17
-
-
55349083998
-
Declarative infrastructure configuration synthesis and debugging
-
Sanjai Narain, Gary Levin, Vikram Kaul, and Sharad Malik. Declarative infrastructure configuration synthesis and debugging. J. Network Systems and Management, Special Issue on Security Configuration, 2008.
-
(2008)
J. Network Systems and Management, Special Issue on Security Configuration
-
-
Narain, S.1
Levin, G.2
Kaul, V.3
Malik, S.4
-
22
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
November
-
Lingyu Wang, Steven Noel, and Sushil Jajodia. Minimum-cost network hardening using attack graphs. Computer Communications, 29:3812- 3824, November 2006.
-
(2006)
Computer Communications
, vol.29
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
|