-
1
-
-
84976753721
-
A class of generalized stochastic Petri nets for the performance analysis of multiprocessor systems
-
Ajmone Marsan M., Balbo G., and Conte G. A class of generalized stochastic Petri nets for the performance analysis of multiprocessor systems. ACM Transactions on Computer Systems 2 1 (1984)
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.1
-
-
Ajmone Marsan, M.1
Balbo, G.2
Conte, G.3
-
2
-
-
33750958509
-
Defense trees for economic evaluation of security investments, availability, reliability and security. ARES 2006
-
April
-
Bistarelli S, Fioravanti F, Peretti P. Defense trees for economic evaluation of security investments, availability, reliability and security. ARES 2006. In: The first international conference on 20-22 April 2006; 2006. p. 8.
-
(2006)
The first international conference on 20-22
, pp. 8
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
3
-
-
33845918418
-
-
Imperial College DoC Group Project
-
Bloom J., Clark C., Clifford C., Duncan A., Khan H., Papantoniou M., et al. PIPE (2004), Imperial College DoC Group Project
-
(2004)
PIPE
-
-
Bloom, J.1
Clark, C.2
Clifford, C.3
Duncan, A.4
Khan, H.5
Papantoniou, M.6
-
6
-
-
10944259927
-
Risk-based systems security engineering: stopping attacks with intention
-
Evans S., Heinbuch D., Kyule E., Piorkowski J., and Wallner J. Risk-based systems security engineering: stopping attacks with intention. IEEE Security and Privacy 02 6 (2004) 59-62
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 59-62
-
-
Evans, S.1
Heinbuch, D.2
Kyule, E.3
Piorkowski, J.4
Wallner, J.5
-
7
-
-
33847364848
-
-
Casey Fung; Yi-Liang Chen; Xinyu Wang; Lee, J.; Tarquini, R.; Anderson, M.; et-al, Survivability analysis of distributed systems using attack tree methodology, Military Communications Conference. MILCOM 2005. In: IEEE, 1, 17-20 October 2005; 2005. pp. 583-89.
-
Casey Fung; Yi-Liang Chen; Xinyu Wang; Lee, J.; Tarquini, R.; Anderson, M.; et-al, Survivability analysis of distributed systems using attack tree methodology, Military Communications Conference. MILCOM 2005. In: IEEE, vol. 1, 17-20 October 2005; 2005. pp. 583-89.
-
-
-
-
8
-
-
42749101387
-
Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection, Security Technology. CCST '05
-
October
-
Higuero MV, Unzilla JJ, Jacob E, Saiz P, Aguado M, Luengo D. Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection, Security Technology. CCST '05. In: 39th Annual 2005 International Carnahan Conference on 11-14 October 2005; 2005. pp. 57-60.
-
(2005)
39th Annual 2005 International Carnahan Conference on 11-14
, pp. 57-60
-
-
Higuero, M.V.1
Unzilla, J.J.2
Jacob, E.3
Saiz, P.4
Aguado, M.5
Luengo, D.6
-
9
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson E., and Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 23 4 (1997) 235-245
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
10
-
-
0036926468
-
Modeling and quantification of security attributes of software systems, dependable systems and networks, 2002
-
Madan BB, Gogeva-Popstojanova K, Vaidyanathan K, Trivedi KS. Modeling and quantification of security attributes of software systems, dependable systems and networks, 2002. In: Proceedings international conference on; 2002. pp. 505-14.
-
(2002)
Proceedings international conference on
, pp. 505-514
-
-
Madan, B.B.1
Gogeva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
12
-
-
33749639831
-
Quantitative cyber risk reduction estimation methodology for a small SCADA control system, system sciences. HICSS '06
-
January
-
McQueen MA, Boyer WF, Flynn MA, Beitel GA. Quantitative cyber risk reduction estimation methodology for a small SCADA control system, system sciences. HICSS '06. In: Proceedings of the 39th annual Hawaii international conference on 04-07 January 2006, vol. 9; 2006. pp. 226-26.
-
(2006)
Proceedings of the 39th annual Hawaii international conference on 04-07
, vol.9
, pp. 226-226
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
13
-
-
1642283261
-
-
University of California Computer Science Department, Los Angeles, CA
-
Mirkovic J., Martin J., and Reiher P. A Taxonomy of DDoS attacks and DDoS defense mechanisms (2001), University of California Computer Science Department, Los Angeles, CA
-
(2001)
A Taxonomy of DDoS attacks and DDoS defense mechanisms
-
-
Mirkovic, J.1
Martin, J.2
Reiher, P.3
-
14
-
-
71849115640
-
-
Moore AP, Ellison RJ, Linger RC. Attack modeling for information security and survivability. Software Engineering Institute Technical Report CMU/SEI-2001; 2001.
-
Moore AP, Ellison RJ, Linger RC. Attack modeling for information security and survivability. Software Engineering Institute Technical Report CMU/SEI-2001; 2001.
-
-
-
-
16
-
-
71849090656
-
Towards a stochastic model for integrated security and dependability evaluation, availability, reliability and security. ARES 2006
-
April
-
Sallhammar K, Helvik BE, Knapskog SJ. Towards a stochastic model for integrated security and dependability evaluation, availability, reliability and security. ARES 2006. In: The first international conference on 20-22 April 2006; 2006. p. 8.
-
(2006)
The first international conference on 20-22
, pp. 8
-
-
Sallhammar, K.1
Helvik, B.E.2
Knapskog, S.J.3
-
17
-
-
0002670359
-
Attack trees: modeling security threats
-
Schneier B. Attack trees: modeling security threats. Dr. Dobb's Journal (December 1999)
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
19
-
-
0029342168
-
Low overhead multiprocessor allocation strategies exploiting system spare capacity for fault detection and location
-
Tridandapani S., Somani A.K., and Sandadi U.R. Low overhead multiprocessor allocation strategies exploiting system spare capacity for fault detection and location. IEEE Transactions on Computers 44 7 (1995) 865-877
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.7
, pp. 865-877
-
-
Tridandapani, S.1
Somani, A.K.2
Sandadi, U.R.3
|