-
1
-
-
0022420723
-
Defining liveness
-
Alpern, B. and Schneider, F.B. (1985) 'Defining liveness', Information Processing Letters, Vol. 21, No.4, pp.181-185.
-
(1985)
Information Processing Letters
, vol.21
, Issue.4
, pp. 181-185
-
-
Alpern, B.1
Schneider, F.B.2
-
2
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
New York, NY: ACM Press
-
Ammann, P., Wijesekera, D. and Kaushik, S. (2002) 'Scalable, graph-based network vulnerability analysis', Proceedings of the 9th ACM Conference on Computer and Communications Security, New York, NY: ACM Press, pp.217-224.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
4
-
-
33751017347
-
A formal approach to specify and deploy a network security policy
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T. and Miège, A. (2004) 'A formal approach to specify and deploy a network security policy', Second Workshop on Formal Aspects in Security and Trust (FAST).
-
(2004)
Second Workshop on Formal Aspects in Security and Trust (FAST)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Miège, A.4
-
5
-
-
84948760464
-
Two formal analyses of attack graphs
-
24-26 June 2002, Cape Breton, Nova Scotia, Canada: IEEE Computer Society
-
Jha, S., Sheyner, O. and Wing, J.M. (2002) 'Two formal analyses of attack graphs', 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada: IEEE Computer Society pp.49-63.
-
(2002)
15th IEEE Computer Security Foundations Workshop (CSFW-15 2002)
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.M.3
-
8
-
-
77956988169
-
M2d2: A formal data model for ids alert correlation, Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002
-
Zurich, Switzerland, 16-18 October 2002
-
Morin, B., Mé, L., Debar, H. and Ducassé, M. (2002) 'M2d2: A formal data model for ids alert correlation', Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, 16-18 October 2002, Proceedings Volume 2516 of Lecture Notes in Computer Science, pp. 115-137.
-
(2002)
Proceedings Volume 2516 of Lecture Notes in Computer Science
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
9
-
-
0030291625
-
Approximately satisfied properties of systems and simple language homomorphisms
-
Nitsche, U. and Ochsenschläger, P. (1996) 'Approximately satisfied properties of systems and simple language homomorphisms', Information Processing Letters, Vol. 60, pp.201-206.
-
(1996)
Information Processing Letters
, vol.60
, pp. 201-206
-
-
Nitsche, U.1
Ochsenschläger, P.2
-
10
-
-
20444480299
-
Managing attack graph complexity through visual hierarchical aggregation
-
New York, NY: ACM Press
-
Noel, S. and Jajodia, S. (2004) 'Managing attack graph complexity through visual hierarchical aggregation', VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, New York, NY: ACM Press, pp. 109-118.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 109-118
-
-
Noel, S.1
Jajodia, S.2
-
11
-
-
33749520206
-
Multiple coordinated views for network attack graphs
-
Los Alamitos, CA: IEEE Computer Society
-
Noel, S., Jacobs, M., Kalapa, P., and Jajodia, S. (2005) 'Multiple coordinated views for network attack graphs', IEEE Workshop on Visualization for Computer Security (VizSec '05), Los Alamitos, CA: IEEE Computer Society.
-
(2005)
IEEE Workshop on Visualization for Computer Security (VizSec '05)
-
-
Noel, S.1
Jacobs, M.2
Kalapa, P.3
Jajodia, S.4
-
12
-
-
0002998924
-
Verification of cooperating systems by simple homomorphisms using the product net machine
-
in J. Desel, A. Oberweis and W. Reisig (Eds). Humboldt Universität Berlin
-
Ochsenschläger, P. (1994) 'Verification of cooperating systems by simple homomorphisms using the product net machine', in J. Desel, A. Oberweis and W. Reisig (Eds). Workshop: Algorithmen und Werkzeuge für Petrinetze, Humboldt Universität Berlin, pp.48-53.
-
(1994)
Workshop: Algorithmen und Werkzeuge für Petrinetze
, pp. 48-53
-
-
Ochsenschläger, P.1
-
13
-
-
26844510610
-
The SH- Verification tool abstractionbased verification of co-operating systems, formal aspects of computing
-
Ochsenschläger, P., Repp, J., Rieke, R., and Nitsche, U. (1999) 'The SH- verification tool abstractionbased verification of co-operating systems, formal aspects of computing', The International Journal of Formal Method Vol 11, pp.1-24.
-
(1999)
The International Journal of Formal Method
, vol.11
, pp. 1-24
-
-
Ochsenschläger, P.1
Repp, J.2
Rieke, R.3
Nitsche, U.4
-
14
-
-
25044449822
-
The SH- Verification tool
-
Orlando, FL: AAAI Press
-
Ochsenschläger, P., Repp, J. and Rieke, R. (2000a) 'The SH- verification tool', Proceedings of 13th International Florida Artificial Intelligence Research Society Conference (FLAIRS-2000), Orlando, FL: AAAI Press, pp. 18-22
-
(2000)
Proceedings of 13th International Florida Artificial Intelligence Research Society Conference (FLAIRS-2000)
, pp. 18-22
-
-
Ochsenschläger, P.1
Repp, J.2
Rieke, R.3
-
15
-
-
25044467567
-
Verification of cooperating systems - An approach based on formal languages
-
Orlando, FL: AAAI Press
-
Ochsenschläger, P., Repp, J. and Rieke, R. (2000b) 'Verification of cooperating systems - an approach based on formal languages', Proceedings of 13th International Florida Artificial Intelligence Research Society Conference (FLAIRS-2000), Orlando, FL: AAAI Press, pp.346-350.
-
(2000)
Proceedings of 13th International Florida Artificial Intelligence Research Society Conference (FLAIRS-2000)
, pp. 346-350
-
-
Ochsenschläger, P.1
Repp, J.2
Rieke, R.3
-
16
-
-
84884995221
-
Abstraction based verification of a parameterised policy controlled system
-
of CCIS, Springer
-
Ochsenschläger, P. and Rieke, R. (2007) 'Abstraction based verification of a parameterised policy controlled system', International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-07), Vol. 1 of CCIS, Springer.
-
(2007)
International Conference Mathematical Methods, Models and Architectures for Computer Networks Security(MMM-ACNS-07)
, vol.1
-
-
Ochsenschläger, P.1
Rieke, R.2
-
17
-
-
84988504967
-
A graph-based system for network-vulnerability analysis
-
22-25 September, 1998, Charlottsville, VA: ACM Press
-
Phillips, C.A. and Swiler, L.P. (1998) 'A graph-based system for network-vulnerability analysis', NSPW '98, Proceedings of the 1998 Workshop on New Security Paradigms, 22-25 September, 1998, Charlottsville, VA: ACM Press, pp.71-79.
-
(1998)
NSPW '98, Proceedings of the 1998 Workshop on New Security Paradigms
, pp. 71-79
-
-
Phillips, C.A.1
Swiler, L.P.2
-
18
-
-
77957015365
-
Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration
-
in U.E. Gattiker (Ed). Copenhagen, EICAR e.V.
-
Rieke, R. (2004) 'Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration', in U.E. Gattiker (Ed). Eicar 2004 Conference CD-rom: Best Paper Proceedings, Copenhagen, EICAR e.V.
-
(2004)
Eicar 2004 Conference CD-rom: Best Paper Proceedings
-
-
Rieke, R.1
-
19
-
-
48349138669
-
Modelling and analysing network security policies in a given vulnerability setting
-
Samos Island, Greece, of LNCS, Springer
-
Rieke, R. (2006) 'Modelling and analysing network security policies in a given vulnerability setting', Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos Island, Greece, Vol. 4347 of LNCS, Springer, pp.67-78.
-
(2006)
Critical Information Infrastructures Security, First International Workshop, CRITIS 2006
, vol.4347
, pp. 67-78
-
-
Rieke, R.1
-
21
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
12-15 May, 2002, Berkeley, CA: IEEE Comp. Soc. Press
-
Sheyner, O., Haines, J.W., Jha, S., Lippmann, R. and Wing, J.M. (2002) 'Automated generation and analysis of attack graphs', 2002 IEEE Symposium on Security and Privacy, 12-15 May, 2002, Berkeley, CA: IEEE Comp. Soc. Press, pp.273-284.
-
(2002)
2002 IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.W.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
22
-
-
84964504906
-
Computer-attack graph generation tool
-
12-14 June, 2001, Anaheim, CA: IEEE Computer Society
-
Swiler, L.P., Phillips, C., Ellis, D. and Chakerian, S. (2001) 'Computer-attack graph generation tool', DARPA Information Survivability Conference and Exposition (DISCEX II'01) Vol. 2, 12-14 June, 2001, Anaheim, CA: IEEE Computer Society, pp. 1307-1321.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II'01)
, vol.2
, pp. 1307-1321
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
|