-
2
-
-
0002670359
-
Attack Trees
-
B. Schneier, "Attack Trees", Dr. Dobb's Journal, vol.24, no.12, pp.21-29, 1999.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
3
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
D. M. Nicol, W. H. Sanders, and K. S. Trivedi, "Model-based evaluation: From dependability to security," IEEE Trans. on Dependable and Secure Computing, vol.1, no.1, pp. 48-65, 2004.
-
(2004)
IEEE Trans. on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
4
-
-
0026155432
-
Intrusion tolerance in distributed computing systems
-
Y. Deswarte, L. Blain, and J. C. Fabre, "Intrusion tolerance in distributed computing systems," In Proc. of Symp. on Research in Security and Privacy, IEEE, pp.110-121, 1991. (Pubitemid 21717663)
-
(1991)
Proceedings of the Symposium on Security and Privacy
, pp. 110-121
-
-
Deswarte, Y.1
Blain, L.2
Fabre, J.-C.3
-
5
-
-
67349138591
-
The design of a generic Intrusion-Tolerant architecture for Web Servers
-
A. Saidane, V. Nicomette, and Y. Deswarte, "The design of a generic Intrusion-Tolerant architecture for Web Servers", IEEE Trans. on dependable and secure computing, vol.5, no.2, 2008.
-
(2008)
IEEE Trans. on Dependable and Secure Computing
, vol.5
, Issue.2
-
-
Saidane, A.1
Nicomette, V.2
Deswarte, Y.3
-
8
-
-
2642540118
-
Modeling Internet attacks
-
T. Tidwell, R. Larson, K. Fitch, and J. Hale, "Modeling Internet attacks", in Proc. of the IEEE Workshop on Information Assurance and Security, USA, 2001.
-
Proc. of the IEEE Workshop on Information Assurance and Security, USA, 2001
-
-
Tidwell, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
-
9
-
-
0038226150
-
-
Software Engineering Institute, Carnegie Mellon University, Technical note: CMU/SEI-2001-TN-001
-
A. P. Moore, R. J. Ellison, and R. C. Linger, "Attack modeling for information security and survivability," Software Engineering Institute, Carnegie Mellon University, Technical note: CMU/SEI-2001-TN-001, 2001.
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
10
-
-
33745983856
-
OWA trees and their role in security modeling using attack trees
-
R. R. Yager, and Ht, "OWA trees and their role in security modeling using attack trees," Information Sciences, vol.176, no.20, pp. 2933-2959, 2006.
-
(2006)
Information Sciences
, vol.176
, Issue.20
, pp. 2933-2959
-
-
Yager, R.R.1
-
11
-
-
35048855032
-
Application of 'Attack Trees' Technique to Copyright Protection Protocols Using Watermarking and Definition of a New Transactions Protocol SecDP (Secure Distribution Protocol)
-
M. V. Higuero, J. J. Unzilla, E. Jacob, P. Sáiz, and D. Luengo, " Application of 'Attack Trees' Technique to Copyright Protection Protocols Using Watermarking and Definition of a New Transactions Protocol SecDP (Secure Distribution Protocol)", Lecture Notes in Computer Science (LNCS) 3311, pp. 264-275, 2004.
-
(2004)
Lecture Notes in Computer Science (LNCS)
, vol.3311
, pp. 264-275
-
-
Higuero, M.V.1
Unzilla, J.J.2
Jacob, E.3
Sáiz, P.4
Luengo, D.5
-
12
-
-
34047240072
-
The use of attack trees in assessing vulnerabilities in SCADA systems
-
E. J. Byres, M. Franz and D. Miller, "The use of attack trees in assessing vulnerabilities in SCADA systems" in Int. Infrastructure Survivability Workshop (IISW'04), Lisbon, Portugal, 2004.
-
Int. Infrastructure Survivability Workshop (IISW'04), Lisbon, Portugal, 2004
-
-
Byres, E.J.1
Franz, M.2
Miller, D.3
-
13
-
-
33847364848
-
Survivability analysis of distributed systems using attack tree methodology
-
C. Fung, Y. L. Chen, X. Wang, J. Lee, R. Tarquini, M. Anderson and R. Linger, "Survivability analysis of distributed systems using attack tree methodology", IEEE Military Communications Conf., (MILCOM 2005), USA, Vol.1, pp. 583- 589, 2005.
-
(2005)
IEEE Military Communications Conf., (MILCOM 2005), USA
, vol.1
, pp. 583-589
-
-
Fung, C.1
Chen, Y.L.2
Wang, X.3
Lee, J.4
Tarquini, R.5
Anderson, M.6
Linger, R.7
-
14
-
-
39749143545
-
The use of attack and protection trees to analyze security for an online banking system
-
K. Edge, R. Raines, R. Bennington and C. Reuter, "The use of attack and protection trees to analyze security for an online banking system", In Proc. of the 40th Hawaii Int. Conf. on System Sciences, 2007.
-
Proc. of the 40th Hawaii Int. Conf. on System Sciences, 2007
-
-
Edge, K.1
Raines, R.2
Bennington, R.3
Reuter, C.4
-
15
-
-
42549101645
-
Vulnerability assessment of cyber security for SCADA systems using attack trees
-
C. W. Ten, C. C. Liu, and M. Govindarasu, "Vulnerability assessment of cyber security for SCADA systems using attack trees," In Proc. of IEEE Power Engineering Society General Meeting, pp.1-8, 2007.
-
(2007)
Proc. of IEEE Power Engineering Society General Meeting
, pp. 1-8
-
-
Ten, C.W.1
Liu, C.C.2
Govindarasu, M.3
-
16
-
-
35148896736
-
Using attack and protection trees to analyze threats and defenses to Homeland security
-
K. S. Edge, G. C. Dalton, R. A. Raines, R. F. Mills, "Using attack and protection trees to analyze threats and defenses to Homeland security," In Proc. of Military Communications Conf. (MILCOM 2006), pp.1-7, 2006.
-
(2006)
Proc. of Military Communications Conf. (MILCOM 2006)
, pp. 1-7
-
-
Edge, K.S.1
Dalton, G.C.2
Raines, R.A.3
Mills, R.F.4
-
19
-
-
0026925395
-
Dynamic fault-tree models for fault-tolerant computer systems
-
DOI 10.1109/24.159800
-
J. B. Dugan, S. J. Bavuso, M. A Boyd, "Dynamic fault-tree models for fault-tolerant computer systems," IEEE Trans. on Reliability, vol.41, no.3, pp. 363-377, 1992 (Pubitemid 23555745)
-
(1992)
IEEE Transactions on Reliability
, vol.41
, Issue.3
, pp. 363-377
-
-
Dugan Joanne, B.1
Bavuso Salvatore, J.2
Boyd Mark, A.3
|