-
1
-
-
70349281206
-
-
www.physorg.com/newsl24982803.html.
-
-
-
-
2
-
-
70349278162
-
-
www.skyboxsecurity.com.
-
-
-
-
3
-
-
0036039865
-
Adaptive functional programming
-
New York, NY, USA, ACM Press
-
U. A. Acar, G. E. Blelloch, and R. Harper. Adaptive functional programming. In ACMPOPL, volume 37, pages 247-259, New York, NY, USA, 2002. ACM Press.
-
(2002)
ACMPOPL
, vol.37
, pp. 247-259
-
-
Acar, U.A.1
Blelloch, G.E.2
Harper, R.3
-
4
-
-
33845953872
-
-
The National Security Agency
-
TM.
-
TM
-
-
-
5
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
New York, NY, USA, ACM Press
-
Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In CCS '02, pages 217-224, New York, NY, USA, 2002. ACM Press.
-
(2002)
CCS '02
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
7
-
-
34547365455
-
A Windows access control demystified
-
Tech. rep, princeton university
-
Sudhakar Govindavajhala and Andrew Appel. A Windows access control demystified. Tech. rep., princeton university, 2006.
-
(2006)
-
-
Govindavajhala, S.1
Appel, A.2
-
10
-
-
34047168454
-
An annotated review of past papers on attack graphs
-
Technical report, MIT Lincoln Laboratory, USA, March
-
R. Lippmann and K. Ingols. An annotated review of past papers on attack graphs. Technical report, MIT Lincoln Laboratory, USA, March 2005.
-
(2005)
-
-
Lippmann, R.1
Ingols, K.2
-
12
-
-
34547327908
-
Netra:: Seeing through access control
-
New York, NY, USA, ACM
-
Prasad Naldurg, Stefan Schwoon, Sriram Rajamani, and John Lambert. Netra:: seeing through access control. In FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security, pages 55-66, New York, NY, USA, 2006. ACM.
-
(2006)
FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security
, pp. 55-66
-
-
Naldurg, P.1
Schwoon, S.2
Rajamani, S.3
Lambert, J.4
-
13
-
-
33749520206
-
Multiple coordinated views for network attack graphs
-
Steven Noel, Michael Jacobs, Pramod Kalapa, and Sushil Jajodia. Multiple coordinated views for network attack graphs. In VizSEC, page 12, 2005.
-
(2005)
VizSEC
, pp. 12
-
-
Noel, S.1
Jacobs, M.2
Kalapa, P.3
Jajodia, S.4
-
14
-
-
20444480299
-
Managing attack graph complexity through visual hierarchical aggregation
-
Steven Noel and Sushil Jajodia. Managing attack graph complexity through visual hierarchical aggregation. In VizSEC, pages 109-118, 2004.
-
(2004)
VizSEC
, pp. 109-118
-
-
Noel, S.1
Jajodia, S.2
-
15
-
-
33846293304
-
Understanding complex network attack graphs through clustered adjacency matrices
-
Steven Noel and Sushil Jajodia. Understanding complex network attack graphs through clustered adjacency matrices. In ACSAC, pages 160-169, 2005.
-
(2005)
ACSAC
, pp. 160-169
-
-
Noel, S.1
Jajodia, S.2
-
16
-
-
85076884574
-
MulVAL: A logic-based network security analyzer
-
Society for Industrial and Applied Mathematics
-
X. Ou, S. Govindavajhala, and A. W. Appel. MulVAL: A logic-based network security analyzer. In 14th USENIX Security Symposium. Society for Industrial and Applied Mathematics, 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Ou, X.1
Govindavajhala, S.2
Appel, A.W.3
-
17
-
-
70349267300
-
-
A Logic-Programming Approach to Network Security Analysis. PhD thesis, Department of Computer Science, Princeton University, USA, November
-
Xinming Ou. A Logic-Programming Approach to Network Security Analysis. PhD thesis, Department of Computer Science, Princeton University, USA, November 2005.
-
(2005)
-
-
Xinming, O.1
-
18
-
-
34547239511
-
A scalable approach to attack graph generation
-
New York, NY, USA, ACM Press
-
Xinming Ou, Wayne F. Boyer, and Miles A. McQueen. A scalable approach to attack graph generation. In CCS '06, pages 336-345, New York, NY, USA, 2006. ACM Press.
-
(2006)
CCS '06
, pp. 336-345
-
-
Ou, X.1
Boyer, W.F.2
McQueen, M.A.3
-
19
-
-
85076884574
-
Mulval: A logic-based network security analyzer
-
Berkeley, CA, USA, USENIX Association
-
Xinming Ou, Sudhakar Govindavajhala, and Andrew W. Appel. Mulval: a logic-based network security analyzer. In SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, pages 8-8, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium
, pp. 8-8
-
-
Ou, X.1
Govindavajhala, S.2
Appel, A.W.3
-
20
-
-
84976843894
-
Finite differencing of computable expressions
-
R. Paige and S. Koenig. Finite differencing of computable expressions. TOPLAS, 4(3):402-454, 1982.
-
(1982)
TOPLAS
, vol.4
, Issue.3
, pp. 402-454
-
-
Paige, R.1
Koenig, S.2
-
21
-
-
35148844598
-
Validating and restoring defense in depth using attack graphs
-
Lippmann R., Ingols K., Scott C, Piwowarski K., Kratkiewicz K., and Cunningham R. Validating and restoring defense in depth using attack graphs. In MTLCOM, 2006.
-
(2006)
MTLCOM
-
-
Lippmann, R.1
Ingols, K.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Cunningham, R.6
-
22
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security (JCS), 10(1 / 2): 189-209, 2002.
-
(2002)
Journal of Computer Security (JCS)
, vol.10
, Issue.1 2
, pp. 189-209
-
-
Ramakrishnan, C.R.1
Sekar, R.2
-
23
-
-
84976827167
-
Incremental context-dependent analysis for language-based editors
-
T. Reps, T. Teitelbaum, and A. Demers. Incremental context-dependent analysis for language-based editors. ACM Trans. Program. Lang. Syst, 5(3):449-477, 1983.
-
(1983)
ACM Trans. Program. Lang. Syst
, vol.5
, Issue.3
, pp. 449-477
-
-
Reps, T.1
Teitelbaum, T.2
Demers, A.3
-
24
-
-
0028446160
-
XSB as an efficient deductive database engine
-
ACM
-
K. Sagonas, Terrace Swift, and D. S. Warren. XSB as an efficient deductive database engine. In ACM SIGMOD, pages 442-453. ACM, 1994.
-
(1994)
ACM SIGMOD
, pp. 442-453
-
-
Sagonas, K.1
Swift, T.2
Warren, D.S.3
-
25
-
-
0348155876
-
Incremental evaluation of tabled logic programs
-
International Conference on Logic Programming, of
-
D. Saha and C. R. Ramakrishnan. Incremental evaluation of tabled logic programs. In International Conference on Logic Programming, volume 2916 of LNCS, pages 389-406, 2003.
-
(2003)
LNCS
, vol.2916
, pp. 389-406
-
-
Saha, D.1
Ramakrishnan, C.R.2
-
27
-
-
33745468608
-
Incremental evaluation of tabled prolog: Beyond pure logic programs
-
Practical Aspects of Declarative Languages, of, Charleston, South Carolina, Jan
-
D. Saha and C. R. Ramakrishnan. Incremental evaluation of tabled prolog: Beyond pure logic programs. In Practical Aspects of Declarative Languages, volume 3819 of LNCS, pages 215-229, Charleston, South Carolina, Jan 2006.
-
(2006)
LNCS
, vol.3819
, pp. 215-229
-
-
Saha, D.1
Ramakrishnan, C.R.2
-
30
-
-
77952411461
-
Security policy analysis using deductive spreadsheets
-
Alexandria, Virginia, Nov
-
Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott Stoller, and David S. Warren. Security policy analysis using deductive spreadsheets. In 5th ACM Workshop on Formal Methods in Security Engineering (FMSE), Alexandria, Virginia, Nov 2007.
-
(2007)
5th ACM Workshop on Formal Methods in Security Engineering (FMSE)
-
-
Singh, A.1
Ramakrishnan, C.R.2
Ramakrishnan, I.V.3
Stoller, S.4
Warren, D.S.5
-
31
-
-
84947984355
-
Incremental model checking in the modal mu-calculus
-
In CAV, of
-
O. V. Sokolsky and S. A. Smolka. Incremental model checking in the modal mu-calculus. In CAV, volume 818 of LNCS, pages 351-363, 1994.
-
(1994)
LNCS
, vol.818
, pp. 351-363
-
-
Sokolsky, O.V.1
Smolka, S.A.2
-
32
-
-
70349265746
-
Rule-based topological vulnerability analysis
-
Vipin Swamp, Sushil Jajodia, and Joseph Pamula. Rule-based topological vulnerability analysis. In MMM-ACNS, pages 23-37, 2005.
-
(2005)
MMM-ACNS
, pp. 23-37
-
-
Swamp, V.1
Jajodia, S.2
Pamula, J.3
-
34
-
-
70349270381
-
-
uDraw(Graph). Available at http://www.informatik.uni-bremen.de/ uDrawGraph/en/uDrawGraph/uDrawGraph.html.
-
uDraw(Graph). Available at http://www.informatik.uni-bremen.de/ uDrawGraph/en/uDrawGraph/uDrawGraph.html.
-
-
-
-
36
-
-
33747198726
-
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
-
Lingyu Wang, Anyi Liu, and Sushil Jajodia. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications, 29(15):2917-2933, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2917-2933
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
-
37
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
Lingyu Wang, Steven Noel, and Sushil Jajodia. Minimum-cost network hardening using attack graphs. Comput. Commun., 29(18):3812-3824, 2006.
-
(2006)
Comput. Commun
, vol.29
, Issue.18
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
-
38
-
-
33746743758
-
Interactive analysis of attack graphs using relational queries
-
Lingyu Wang, Chao Yao, Anoop Singhal, and Sushil Jajodia. Interactive analysis of attack graphs using relational queries. In DBSec, pages 119-132, 2006.
-
(2006)
DBSec
, pp. 119-132
-
-
Wang, L.1
Yao, C.2
Singhal, A.3
Jajodia, S.4
|