-
2
-
-
35148896736
-
Using attack and protection trees to analyze threats and defenses to homeland security
-
25-25 October, Washington DC, (CD)
-
Edge, K., Dalton, G., Raines, R. and Mills, R. (2006) 'Using attack and protection trees to analyze threats and defenses to homeland security', Proceedings of 2006 Military Communications Conference (MILCOM 2006), 25-25 October, Washington DC, pp.1-7 (CD).
-
(2006)
Proceedings of 2006 Military Communications Conference (MILCOM 2006)
, pp. 1-7
-
-
Edge, K.1
Dalton, G.2
Raines, R.3
Mills, R.4
-
3
-
-
39749143545
-
The use of attack and protection trees to analyze security for an online banking system
-
Waikoloa, Hawaii, 3-6 January, (CD)
-
Edge, K., Raines, R., Grimaila, M., Baldwin, R., Bennington, R. and Reuter, C. (2007) 'The use of attack and protection trees to analyze security for an online banking system', Proceeding of 40th Annual Hawaii International Conference on Systems Sciences, Waikoloa, Hawaii, 3-6 January, pp.1-8 (CD).
-
(2007)
Proceeding of 40th Annual Hawaii International Conference on Systems Sciences
, pp. 1-8
-
-
Edge, K.1
Raines, R.2
Grimaila, M.3
Baldwin, R.4
Bennington, R.5
Reuter, C.6
-
4
-
-
33751408730
-
-
Blackhat Briefings, July, Las Vegas
-
Grunwald, L. (2004) RF-ID and Smart-Labels: Myth, Technology, and Attacks, Blackhat Briefings, 24-29 July, Las Vegas.
-
(2004)
RF-ID and Smart-Labels: Myth, Technology, and Attacks
, pp. 24-29
-
-
Grunwald, L.1
-
6
-
-
15944389600
-
-
Carnegie-Mellon University Software Engineering Institute, Technical Report CMU/ SEI-2001-TR-029 ESC-TR- 2001-2029, October
-
Linger, R. and Moore, A. (2001) Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models, Carnegie-Mellon University Software Engineering Institute, Technical Report CMU/ SEI-2001-TR-029 ESC-TR-2001-2029, October.
-
(2001)
Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models
-
-
Linger, R.1
Moore, A.2
-
7
-
-
33845915969
-
Foundations of attack trees
-
LNCS, Seoul, Korea
-
Mauw, S. and Oostdijk, M. (2005) 'Foundations of attack trees', Eighth Annual International Conference on Information Security and Cryptology, LNCS, Seoul, Korea.
-
(2005)
Eighth Annual International Conference on Information Security and Cryptology
-
-
Mauw, S.1
Oostdijk, M.2
-
8
-
-
77949700837
-
-
Chaos Communication Camp, 8-12 August, Finowfurt Germany
-
Meriac, M. and Plotz, H. (2007) Practical RFID Attacks, Chaos Communication Camp, 8-12 August, Finowfurt Germany.
-
(2007)
Practical RFID Attacks
-
-
Meriac, M.1
Plotz, H.2
-
9
-
-
58049172597
-
Classification of RFID attacks
-
Applications, Challenges, IWRT 2008, Barcelona, Spain, June
-
Mitrokotsa, A., Rieback, M. and Tanenbaum, A. (2008) 'Classification of RFID attacks', Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges, IWRT 2008, Barcelona, Spain, June, pp.73-86.
-
(2008)
Proceedings of the 2nd International Workshop on RFID Technology - Concepts
, pp. 73-86
-
-
Mitrokotsa, A.1
Rieback, M.2
Tanenbaum, A.3
-
10
-
-
84964443916
-
The information battlespace preparation experiment
-
Moore, R., Williams, J., Parks, R., Kewley, D., Snyder, D. and Tinnel, L. (2001) 'The information battlespace preparation experiment', Proceedings of DARPA Information Survivability Conference and Exposition II, DISCEX'01, p.0352.
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition II, DISCEX'01
, pp. 0352
-
-
Moore, R.1
Williams, J.2
Parks, R.3
Kewley, D.4
Snyder, D.5
Tinnel, L.6
-
11
-
-
33845921799
-
Attack trees: It's a jungle out there - Seeing your system through a Hacker's eyes
-
Pallos, M. (2004) 'Attack trees: it's a jungle out there - seeing your system through a Hacker's eyes', WebSphere Online Journal, Vol.3, pp.12-14.
-
(2004)
WebSphere Online Journal
, vol.3
, pp. 12-14
-
-
Pallos, M.1
-
12
-
-
0006290403
-
-
Addison-Wesley-Longman, Inc., Reading, MA
-
Prowell, S., Trammell, C., Linger, R. and Poore, J. (1999) Cleanroom Software Engineering: Technology and Process, Addison-Wesley-Longman, Inc., Reading, MA.
-
(1999)
Cleanroom Software Engineering: Technology and Process
-
-
Prowell, S.1
Trammell, C.2
Linger, R.3
Poore, J.4
-
13
-
-
67650085422
-
An enumeration of RFID related threats
-
Valencia, Spain, 29 September-4 October
-
Schaberreiter, T., Wieser, C., Sanchez, I., Riekki, J. and Roning, J. (2008) 'An enumeration of RFID related threats', International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Valencia, Spain, 29 September-4 October, pp.381-389.
-
(2008)
International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
, pp. 381-389
-
-
Schaberreiter, T.1
Wieser, C.2
Sanchez, I.3
Riekki, J.4
Roning, J.5
-
14
-
-
0002670359
-
Attack trees: Modelling security threats
-
Schneier, B. (1999) 'Attack trees: modelling security threats', Dr. Dobb's Journal, Vol.24, pp.21-29.
-
(1999)
Dr Dobb's Journal
, vol.24
, pp. 21-29
-
-
Schneier, B.1
-
16
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Oakland CA, 12-15 May
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R. and Wing, J. (2002) 'Automated generation and analysis of attack graphs', Proceedings of the IEEE Symposium on Security and Privacy, Oakland CA, 12-15 May, pp.273-284.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
18
-
-
0036038515
-
Collaborative attack modeling
-
11-14 March, Madrid, Spain
-
Steffan, J. and Schumacher, M. (2002) 'Collaborative attack modeling', Proceedings of the 2002 ACM symposium on Applied Computing, 11-14 March, Madrid, Spain, pp.253-259.
-
(2002)
Proceedings of the 2002 ACM Symposium on Applied Computing
, pp. 253-259
-
-
Steffan, J.1
Schumacher, M.2
|