메뉴 건너뛰기




Volumn 1, Issue 1-2, 2008, Pages 59-77

Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures

Author keywords

Attack simulation; Critical infrastructure protection; Network security policies; Risk assessment; Security modelling and simulation; Threats analysis; Unknown vulnerabilities

Indexed keywords


EID: 67349217470     PISSN: 17480671     EISSN: 1748068X     Source Type: Journal    
DOI: 10.1504/IJSSE.2008.018131     Document Type: Article
Times cited : (7)

References (22)
  • 5
    • 84948760464 scopus 로고    scopus 로고
    • Two formal analyses of attack graphs
    • 24-26 June 2002, Cape Breton, Nova Scotia, Canada: IEEE Computer Society
    • Jha, S., Sheyner, O. and Wing, J.M. (2002) 'Two formal analyses of attack graphs', 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada: IEEE Computer Society pp.49-63.
    • (2002) 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002) , pp. 49-63
    • Jha, S.1    Sheyner, O.2    Wing, J.M.3
  • 8
    • 77956988169 scopus 로고    scopus 로고
    • M2d2: A formal data model for ids alert correlation, Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002
    • Zurich, Switzerland, 16-18 October 2002
    • Morin, B., Mé, L., Debar, H. and Ducassé, M. (2002) 'M2d2: A formal data model for ids alert correlation', Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, 16-18 October 2002, Proceedings Volume 2516 of Lecture Notes in Computer Science, pp. 115-137.
    • (2002) Proceedings Volume 2516 of Lecture Notes in Computer Science , pp. 115-137
    • Morin, B.1    Mé, L.2    Debar, H.3    Ducassé, M.4
  • 9
    • 0030291625 scopus 로고    scopus 로고
    • Approximately satisfied properties of systems and simple language homomorphisms
    • Nitsche, U. and Ochsenschläger, P. (1996) 'Approximately satisfied properties of systems and simple language homomorphisms', Information Processing Letters, Vol. 60, pp.201-206.
    • (1996) Information Processing Letters , vol.60 , pp. 201-206
    • Nitsche, U.1    Ochsenschläger, P.2
  • 12
    • 0002998924 scopus 로고
    • Verification of cooperating systems by simple homomorphisms using the product net machine
    • in J. Desel, A. Oberweis and W. Reisig (Eds). Humboldt Universität Berlin
    • Ochsenschläger, P. (1994) 'Verification of cooperating systems by simple homomorphisms using the product net machine', in J. Desel, A. Oberweis and W. Reisig (Eds). Workshop: Algorithmen und Werkzeuge für Petrinetze, Humboldt Universität Berlin, pp.48-53.
    • (1994) Workshop: Algorithmen und Werkzeuge für Petrinetze , pp. 48-53
    • Ochsenschläger, P.1
  • 13
    • 26844510610 scopus 로고    scopus 로고
    • The SH- Verification tool abstractionbased verification of co-operating systems, formal aspects of computing
    • Ochsenschläger, P., Repp, J., Rieke, R., and Nitsche, U. (1999) 'The SH- verification tool abstractionbased verification of co-operating systems, formal aspects of computing', The International Journal of Formal Method Vol 11, pp.1-24.
    • (1999) The International Journal of Formal Method , vol.11 , pp. 1-24
    • Ochsenschläger, P.1    Repp, J.2    Rieke, R.3    Nitsche, U.4
  • 18
    • 77957015365 scopus 로고    scopus 로고
    • Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration
    • in U.E. Gattiker (Ed). Copenhagen, EICAR e.V.
    • Rieke, R. (2004) 'Tool based formal modelling, analysis and visualisation of enterprise network vulnerabilities utilising attack graph exploration', in U.E. Gattiker (Ed). Eicar 2004 Conference CD-rom: Best Paper Proceedings, Copenhagen, EICAR e.V.
    • (2004) Eicar 2004 Conference CD-rom: Best Paper Proceedings
    • Rieke, R.1
  • 19
    • 48349138669 scopus 로고    scopus 로고
    • Modelling and analysing network security policies in a given vulnerability setting
    • Samos Island, Greece, of LNCS, Springer
    • Rieke, R. (2006) 'Modelling and analysing network security policies in a given vulnerability setting', Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos Island, Greece, Vol. 4347 of LNCS, Springer, pp.67-78.
    • (2006) Critical Information Infrastructures Security, First International Workshop, CRITIS 2006 , vol.4347 , pp. 67-78
    • Rieke, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.