-
1
-
-
33846269000
-
A host-based approach to network attack chaining analysis
-
Washington, DC, USA, IEEE Computer Society
-
P. Ammann, J. Pamula, J. Street, and R. Ritchey. A host-based approach to network attack chaining analysis. In ACSAC '05: Proc. of the 21st Annual Computer Security Applications Conference, pages 72-84, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ACSAC '05: Proc. of the 21st Annual Computer Security Applications Conference
, pp. 72-84
-
-
Ammann, P.1
Pamula, J.2
Street, J.3
Ritchey, R.4
-
2
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
New York, NY, USA, ACM
-
P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 217-224, New York, NY, USA, 2002. ACM.
-
(2002)
CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
3
-
-
0003450426
-
-
Springer-Verlag, Berlin
-
B. Berard, M. Bidoit, A. Finkel, F. Laroussinie, A. Petit, L. Petrucci, and P. Schnoebelen. Systems and software verification: Model-checking techniques and tools. Springer-Verlag, Berlin, 2001.
-
(2001)
Systems and software verification: Model-checking techniques and tools
-
-
Berard, B.1
Bidoit, M.2
Finkel, A.3
Laroussinie, F.4
Petit, A.5
Petrucci, L.6
Schnoebelen, P.7
-
4
-
-
29144460240
-
-
Monographs in Computer Science. Springer, New York
-
L. Cardelli. Bioware Languages, pages 59-65. Monographs in Computer Science. Springer, New York, 2004.
-
(2004)
Bioware Languages
, pp. 59-65
-
-
Cardelli, L.1
-
5
-
-
84947919695
-
Mobile Ambients
-
Foundations of Software Science and Computation Structures: First International Conference, FOSSACS'98, of, Berlin Germany, Springer-Verlag
-
L. Cardelli and A. D. Gordon. Mobile Ambients. In Foundations of Software Science and Computation Structures: First International Conference, FOSSACS'98, volume 1378 of LNCS, pages 140-155, Berlin Germany, 1998. Springer-Verlag.
-
(1998)
LNCS
, vol.1378
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.D.2
-
6
-
-
0032670228
-
Types for Mobile Ambients
-
New York, NY, USA, ACM
-
L. Cardelli and A. D. Gordon. Types for Mobile Ambients. In POPL'99: Proc. of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 79-92, New York, NY, USA, 1999. ACM.
-
(1999)
POPL'99: Proc. of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 79-92
-
-
Cardelli, L.1
Gordon, A.D.2
-
7
-
-
27544447707
-
Towards a Theory of Insider Threat Assessment
-
IEEE Publishing, July 2005
-
R. Chinchani, A. Iyer, H. Q. Ngo, and S. Upadhyaya. Towards a Theory of Insider Threat Assessment. In DSN 2005: Int. Conference on Dependable Systems and Networks, pages 108-117. IEEE Publishing, July 2005. http://ieeexplore.ieee.org/iel5/9904/31476/01467785.pdf.
-
DSN 2005: Int. Conference on Dependable Systems and Networks
, pp. 108-117
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.Q.3
Upadhyaya, S.4
-
9
-
-
46749110444
-
-
V. N. L. Franqueira and R. H. C. Lopes. Vulnerability Assessment by Learning Attack Specifications in Graphs. In IAS'07: Proc. of the 3rd Int. Symposium on Information Assurance and Security, pages 161-164, August 2007.
-
V. N. L. Franqueira and R. H. C. Lopes. Vulnerability Assessment by Learning Attack Specifications in Graphs. In IAS'07: Proc. of the 3rd Int. Symposium on Information Assurance and Security), pages 161-164, August 2007.
-
-
-
-
10
-
-
72949105563
-
Multi-step Attack Modelling and Simulation (MsAMS) Framework based on Mobile Ambients
-
Technical Report TR-CTIT-08-44, Centre for Telematics and Information Technology CTIT, University of Twente, Enschede, The Netherlands, June
-
V. N. L. Franqueira, R. H. C. Lopes, and P. van Eck. Multi-step Attack Modelling and Simulation (MsAMS) Framework based on Mobile Ambients. Technical Report TR-CTIT-08-44, Centre for Telematics and Information Technology (CTIT), University of Twente, Enschede, The Netherlands, June 2008.
-
(2008)
-
-
Franqueira, V.N.L.1
Lopes, R.H.C.2
van Eck, P.3
-
11
-
-
84958956850
-
Attacks against computer network: Formal grammar-based framework and simulation tool
-
A.Wespi, G.Vigna, and L.Deri, editors, RAID 2002: Proc. of the Fifth Int. Symposium on Recent Advances in Intrusion Detection, of, Springer, October
-
V. Gorodetski and I. Kotenko. Attacks against computer network: Formal grammar-based framework and simulation tool. In A.Wespi, G.Vigna, and L.Deri, editors, RAID 2002: Proc. of the Fifth Int. Symposium on Recent Advances in Intrusion Detection, volume 2516 of LNCS, pages 219-238. Springer, October 2002.
-
(2002)
LNCS
, vol.2516
, pp. 219-238
-
-
Gorodetski, V.1
Kotenko, I.2
-
12
-
-
36448974950
-
Insider threat analysis using information-centric modeling
-
Springer, Boston
-
D. Ha, S. Upadhyaya, H. Q. Ngo, S. Pramanik, R. Chinchani, and S. Mathew. Insider threat analysis using information-centric modeling. In Advances in Digital Forensics III, IFIP International Federation for Information Processing, pages 55-73. Springer, Boston, 2007.
-
(2007)
Advances in Digital Forensics III, IFIP International Federation for Information Processing
, pp. 55-73
-
-
Ha, D.1
Upadhyaya, S.2
Ngo, H.Q.3
Pramanik, S.4
Chinchani, R.5
Mathew, S.6
-
13
-
-
0003843704
-
-
Prentice Hall International, second edition, June 2004. online version at
-
C. A. R. Hoare. Communicating Sequential Processes. Prentice Hall International, second edition, June 2004. online version at http://www.usingcsp. com/cspbook.pdf.
-
Communicating Sequential Processes
-
-
Hoare, C.A.R.1
-
14
-
-
39049104457
-
Practical attack graph generation for network defense
-
Washington, DC, USA, IEEE Computer Society
-
K. Ingols, R. Lippmann, and K. Piwowarski. Practical attack graph generation for network defense. In ACSAC '06: Proc. of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, pages 121-130, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ACSAC '06: Proc. of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
15
-
-
30644476485
-
Topological Analysis of Network Attack Vulnerability
-
Springer-Verlag, Germany
-
S. Jajodia, S. Noel, and B. O'Berry. Topological Analysis of Network Attack Vulnerability. In Managing Cyber Threats: Issues, Approaches and Challenges. Springer-Verlag, Germany, 2005.
-
(2005)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
17
-
-
84868050969
-
Mass hack infects tens of thousands of sites
-
publisehd on January 7, 2008
-
G. Keizer. Mass hack infects tens of thousands of sites. Computerworld, publisehd on January 7, 2008. http://www.computerworld.com/action/article.do? command=viewArticleBasic&taxonomyId=16&articleId=9055858&intsrc= hm-topic. Visited 10-July-2008.
-
Computerworld
-
-
Keizer, G.1
-
18
-
-
0032256758
-
Authoritative Sources in a Hyperlinked Environment
-
Proc. Ninth Ann, New York, ACM Press
-
J. M. Kleinberg. Authoritative Sources in a Hyperlinked Environment. In In Proc. Ninth Ann. ACM-SIAM Symp. Discrete Algorithms, pages 668-677, New York, 1998. ACM Press.
-
(1998)
ACM-SIAM Symp. Discrete Algorithms
, pp. 668-677
-
-
Kleinberg, J.M.1
-
20
-
-
33750734683
-
An approach to model network exploitations using exploitation graphs
-
W. Li, R. B. Vaughn, and Y. S. Dandass. An approach to model network exploitations using exploitation graphs. Simulation, 82(8):523-541, 2006.
-
(2006)
Simulation
, vol.82
, Issue.8
, pp. 523-541
-
-
Li, W.1
Vaughn, R.B.2
Dandass, Y.S.3
-
21
-
-
26444469178
-
Pure bigraphs
-
Technical Report UCAM-CL-TR-614, University of Cambridge, January
-
R. Milner. Pure bigraphs. Technical Report UCAM-CL-TR-614, University of Cambridge, January 2005.
-
(2005)
-
-
Milner, R.1
-
23
-
-
20444480299
-
Managing attack graph complexity through visual hierarchical aggregation
-
New York, NY, USA, ACM
-
S. Noel and S. Jajodia. Managing attack graph complexity through visual hierarchical aggregation. In VizSEC/DMSEC '04: Proc. of the 2004 ACM workshop on Visualization and data mining for computer security, pages 109-118, New York, NY, USA, 2004. ACM. http://doi.acm.org/10.1145/1029208.1029225.
-
(2004)
VizSEC/DMSEC '04: Proc. of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 109-118
-
-
Noel, S.1
Jajodia, S.2
-
25
-
-
34547239511
-
A Scalable Approach to Attack Graph Generation
-
New York, NY, USA
-
X. Ou, W. F. Boyer, and M. A. McQueen. A Scalable Approach to Attack Graph Generation. In CCS '06: Proc. of the 13th ACM Conf. on Computer and Communications Security, pages 336-345, New York, NY, USA, 2006. ACM. people.cis.ksu.edu/~xou/publications/ccs06.pdf.
-
(2006)
CCS '06: Proc. of the 13th ACM Conf. on Computer and Communications Security
, pp. 336-345
-
-
Ou, X.1
Boyer, W.F.2
McQueen, M.A.3
-
26
-
-
85076884574
-
Mulval: A logic-based network security analyzer
-
Berkeley, CA, USA, August, USENIX Association
-
X. Ou, S. Govindavajhala, and A. W. Appel. Mulval: a logic-based network security analyzer. In SSYM'05: Proc. of the 14th Conf. on USENIX Security Symposium, Berkeley, CA, USA, August 2005. USENIX Association. www.cs.princeton.edu/~appel/papers/mulval.pdf.
-
(2005)
SSYM'05: Proc. of the 14th Conf. on USENIX Security Symposium
-
-
Ou, X.1
Govindavajhala, S.2
Appel, A.W.3
-
27
-
-
0033718255
-
Using Model Checking to Analyze Network Vulnerabilities
-
Washington, DC, USA, IEEE Computer Society
-
R. W. Ritchey and P. Ammann. Using Model Checking to Analyze Network Vulnerabilities. In SP'00: Proc. of the 2000 IEEE Symposium on Security and Privacy, pages 156-165, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
SP'00: Proc. of the 2000 IEEE Symposium on Security and Privacy
, pp. 156-165
-
-
Ritchey, R.W.1
Ammann, P.2
-
28
-
-
72949086620
-
-
R. Sawilla and X. Ou. Googling Attack Graphs. Technical Report TM-2007-205, Defense Research and Development Canada, September 2007. http://www.ottawa.drdc-rddc.gc.ca/html/tm-2007-205-e.html.
-
R. Sawilla and X. Ou. Googling Attack Graphs. Technical Report TM-2007-205, Defense Research and Development Canada, September 2007. http://www.ottawa.drdc-rddc.gc.ca/html/tm-2007-205-e.html.
-
-
-
-
30
-
-
33645334192
-
The net of reciprocal influence: A problem in treating sociometric data
-
J. R. Seeley. The net of reciprocal influence: A problem in treating sociometric data. Canadian Jounal of Psychology, 3:234-240, 1949.
-
(1949)
Canadian Jounal of Psychology
, vol.3
, pp. 234-240
-
-
Seeley, J.R.1
-
31
-
-
35048885033
-
-
O. Sheyner and J. Wing. Tools for Generating and Analyzing Attack Graphs. In In Proc. of Workshop on Formal Methods for Components and Objects, LNCS 3188, pages 344-371, Germany, 2004. Springer-Verlag.
-
O. Sheyner and J. Wing. Tools for Generating and Analyzing Attack Graphs. In In Proc. of Workshop on Formal Methods for Components and Objects, LNCS 3188, pages 344-371, Germany, 2004. Springer-Verlag.
-
-
-
-
32
-
-
84964504906
-
Computer-attack graph generation tool
-
Washington, DC, USA, June, IEEE Computer Society
-
L. P. Swiler, C. Phillips, D. Ellis, and S. Chakerian. Computer-attack graph generation tool. In DISCEX II'01: DARPA Information Survivability Conference and Exposition Conference and Exposition, volume 2, pages 307-321, Washington, DC, USA, June 2001. IEEE Computer Society.
-
(2001)
DISCEX II'01: DARPA Information Survivability Conference and Exposition Conference and Exposition
, vol.2
, pp. 307-321
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
33
-
-
0034593179
-
A requires/provides model for computer attacks
-
New York, NY, USA, ACM
-
S. J. Templeton and K. Levitt. A requires/provides model for computer attacks. In NSPW'00: Proc. of the 2000 Workshop on New Security Paradigms, pages 31-38, New York, NY, USA, 2000. ACM.
-
(2000)
NSPW'00: Proc. of the 2000 Workshop on New Security Paradigms
, pp. 31-38
-
-
Templeton, S.J.1
Levitt, K.2
|