-
1
-
-
70449684137
-
-
McAfee, Mcafee vulnerability manager, McAfee Data Sheet, 2008. [Online]. Available: http://www.mcafee.com/us/local content/datasheets/ds mcafee vulnerability manager.pdf
-
McAfee, "Mcafee vulnerability manager," McAfee Data Sheet, 2008. [Online]. Available: http://www.mcafee.com/us/local content/datasheets/ds mcafee vulnerability manager.pdf
-
-
-
-
2
-
-
14844293542
-
Game strategies in network security
-
Feb
-
K.-W. Lye and J. M. Wing, "Game strategies in network security," International Journal of Information Security, vol. 4, no. 1, pp. 71-86, Feb. 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1
, pp. 71-86
-
-
Lye, K.-W.1
Wing, J.M.2
-
3
-
-
61849136266
-
Stochastic models for combined security and dependability evaluation,
-
Ph.D. dissertation, Norwegian University of Science and Technology, Faculty of Information Technologgy, Mathematics and Electrical Engineering, Department of Telematics
-
K. Sallhammar, "Stochastic models for combined security and dependability evaluation," Ph.D. dissertation, Norwegian University of Science and Technology, Faculty of Information Technologgy, Mathematics and Electrical Engineering, Department of Telematics, 2007.
-
(2007)
-
-
Sallhammar, K.1
-
4
-
-
51749097143
-
Security decision-making among interdependent organizations
-
June
-
R. A. Miura-Ko, B. Yolken, J. Mitchell, and N. Bambos, "Security decision-making among interdependent organizations," in Proc. of 21st IEEE Computer Security Foundations Symposium (CSF), June 2008, pp. 66-80.
-
(2008)
Proc. of 21st IEEE Computer Security Foundations Symposium (CSF)
, pp. 66-80
-
-
Miura-Ko, R.A.1
Yolken, B.2
Mitchell, J.3
Bambos, N.4
-
5
-
-
70349267771
-
Revocation games in ephemeral networks
-
Oct
-
M. Raya, M. H. Manshaei, and M. Felégyházi, "Revocation games in ephemeral networks," in Proc. of 15th ACM Conf. on Computer and Communications Security (CCS), Oct. 2008, pp. 199-210.
-
(2008)
Proc. of 15th ACM Conf. on Computer and Communications Security (CCS)
, pp. 199-210
-
-
Raya, M.1
Manshaei, M.H.2
Felégyházi, M.3
-
7
-
-
14344257107
-
A game theoretic analysis of intrusion detection in access control systems
-
Paradise Island, Bahamas, December
-
T. Alpcan and T. Başar, "A game theoretic analysis of intrusion detection in access control systems," in Proc. of 43rd IEEE Conf. Decision and Control, Paradise Island, Bahamas, December 2004, pp. 1568-1573.
-
(2004)
Proc. of 43rd IEEE Conf. Decision and Control
, pp. 1568-1573
-
-
Alpcan, T.1
Başar, T.2
-
9
-
-
84988504967
-
A graph-based system for network-vulnerability analysis
-
New York, NY, USA: ACM
-
C. Phillips and L. P. Swiler, "A graph-based system for network-vulnerability analysis," in Proc. of workshop on New security paradigms (NSPW). New York, NY, USA: ACM, 1998, pp. 71-79.
-
(1998)
Proc. of workshop on New security paradigms (NSPW)
, pp. 71-79
-
-
Phillips, C.1
Swiler, L.P.2
-
10
-
-
33645779967
-
Regular patching cycles
-
March
-
P. Hunter, "Regular patching cycles," Computer Fraud and Security, no. 3, pp. 6-7, March 2006.
-
(2006)
Computer Fraud and Security
, Issue.3
, pp. 6-7
-
-
Hunter, P.1
-
11
-
-
18244372167
-
An automated framework for managing security vulnerabilities
-
A. Al-Ayed, S. M. Furnell, D. Zhao, and P. S. Dowland, "An automated framework for managing security vulnerabilities," Information Management and Computer Security, vol. 13, no. 2, pp. 156-166, 2005.
-
(2005)
Information Management and Computer Security
, vol.13
, Issue.2
, pp. 156-166
-
-
Al-Ayed, A.1
Furnell, S.M.2
Zhao, D.3
Dowland, P.S.4
-
12
-
-
70450242707
-
Security automation considered harmful?
-
White Mountain, NH, USA, September
-
W. K. Edwards, E. S. Poole, and J. Stoll, "Security automation considered harmful?" in Proc. IEEE New Security Paradigms Workshop (NSPW), White Mountain, NH, USA, September 2007.
-
(2007)
Proc. IEEE New Security Paradigms Workshop (NSPW)
-
-
Edwards, W.K.1
Poole, E.S.2
Stoll, J.3
-
14
-
-
39649111300
-
Intrusion response as a resource allocation problem
-
San Diego, CA, USA, December
-
M. Bloem, T. Alpcan, and T. Başar, "Intrusion response as a resource allocation problem," in Proc. of 45th IEEE Conf. Decision and Control, San Diego, CA, USA, December 2006.
-
(2006)
Proc. of 45th IEEE Conf. Decision and Control
-
-
Bloem, M.1
Alpcan, T.2
Başar, T.3
-
16
-
-
0001372435
-
Fuzzy linear programming models to solve fuzzy matrix games
-
L. Campos, "Fuzzy linear programming models to solve fuzzy matrix games," Fuzzy Sets Syst., vol. 32, no. 3, pp. 275-289, 1989.
-
(1989)
Fuzzy Sets Syst
, vol.32
, Issue.3
, pp. 275-289
-
-
Campos, L.1
-
17
-
-
0344584331
-
An approach to fuzzy noncooperative nash games
-
J. C. D. Garagic, "An approach to fuzzy noncooperative nash games," Journal of Optimization Theory and Applications, vol. 118, no. 3, pp. 475-491, 2003.
-
(2003)
Journal of Optimization Theory and Applications
, vol.118
, Issue.3
, pp. 475-491
-
-
Garagic, J.C.D.1
-
18
-
-
33745610810
-
Fuzzy alpha-cut vs. monte carlo techniques in assessing uncertainty in model parameters
-
Proc. of 4th Intl
-
A. Abebe, V. Guinot, and D. Solomatine, "Fuzzy alpha-cut vs. monte carlo techniques in assessing uncertainty in model parameters," in In Proc. of 4th Intl. Conf. on Hydroinformatics, Iowa City, USA, July 2000, 2000.
-
(2000)
Conf. on Hydroinformatics, Iowa City, USA, July
-
-
Abebe, A.1
Guinot, V.2
Solomatine, D.3
|