-
2
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. W. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated generation and analysis of attack graphs," in IEEE Symposium on Security and Privacy, 2002, pp. 273-284.
-
IEEE Symposium on Security and Privacy, 2002
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.W.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
3
-
-
79959542172
-
Toward measuring network security using attack graphs
-
G. Karjoth and K. Stølen, Eds. ACM
-
L. Wang, A. Singhal, and S. Jajodia, "Toward measuring network security using attack graphs," in QoP, G. Karjoth and K. Stølen, Eds. ACM, 2007, pp. 49-54.
-
(2007)
QoP
, pp. 49-54
-
-
Wang, L.1
Singhal, A.2
Jajodia, S.3
-
4
-
-
84944727025
-
Efficient minimum-cost network hardening via exploit dependency graphs
-
IEEE Computer Society
-
S. Noel, S. Jajodia, B. O'Berry, and M. Jacobs, "Efficient minimum-cost network hardening via exploit dependency graphs," in ACSAC. IEEE Computer Society, 2003, pp. 86-95.
-
(2003)
ACSAC
, pp. 86-95
-
-
Noel, S.1
Jajodia, S.2
O'Berry, B.3
Jacobs, M.4
-
5
-
-
50249085983
-
An attack graph-based probabilistic security metric
-
DBSec, ser. V. Atluri, Ed., Springer
-
L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, "An attack graph-based probabilistic security metric," in DBSec, ser. Lecture Notes in Computer Science, V. Atluri, Ed., vol. 5094. Springer, 2008, pp. 283-296.
-
(2008)
Lecture Notes in Computer Science
, vol.5094
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
6
-
-
34547454437
-
A weakest-adversary security metric for network configuration security analysis
-
G. Karjoth and F. Massacci, Eds. ACM
-
J. Pamula, S. Jajodia, P. Ammann, and V. Swarup, "A weakest-adversary security metric for network configuration security analysis," in QoP, G. Karjoth and F. Massacci, Eds. ACM, 2006, pp. 31-38.
-
(2006)
QoP
, pp. 31-38
-
-
Pamula, J.1
Jajodia, S.2
Ammann, P.3
Swarup, V.4
-
7
-
-
70349303945
-
Measuring network security using dynamic bayesian network
-
A. Ozment and K. Stølen, Eds. ACM
-
M. Frigault, L. Wang, A. Singhal, and S. Jajodia, "Measuring network security using dynamic bayesian network," in QoP, A. Ozment and K. Stølen, Eds. ACM, 2008, pp. 23-30.
-
(2008)
QoP
, pp. 23-30
-
-
Frigault, M.1
Wang, L.2
Singhal, A.3
Jajodia, S.4
-
8
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
New York, NY, USA: ACM
-
P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, graph-based network vulnerability analysis," in CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2002, pp. 217-224.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
9
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Kluwer Academic Publisher
-
S. Jajodia, S. Noel, and B. OBerry, "Topological analysis of network attack vulnerability," in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Kluwer Academic Publisher, 2003.
-
(2003)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
Jajodia, S.1
Noel, S.2
OBerry, B.3
-
10
-
-
60649119575
-
Host-centric model checking for network vulnerability analysis
-
Washington, DC, USA: IEEE Computer Society
-
R. Hewett and P. Kijsanayothin, "Host-centric model checking for network vulnerability analysis," in ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2008, pp. 225-234.
-
(2008)
ACSAC '08: Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 225-234
-
-
Hewett, R.1
Kijsanayothin, P.2
-
11
-
-
57049131581
-
Identifying critical attack assets in dependency attack graphs
-
ESORICS, ser. S. Jajodia and J. López, Eds., Springer
-
R. E. Sawilla and X. Ou, "Identifying critical attack assets in dependency attack graphs," in ESORICS, ser. Lecture Notes in Computer Science, S. Jajodia and J. López, Eds., vol. 5283. Springer, 2008, pp. 18-34.
-
(2008)
Lecture Notes in Computer Science
, vol.5283
, pp. 18-34
-
-
Sawilla, R.E.1
Ou, X.2
-
12
-
-
33846269000
-
A host-based approach to network attack chaining analysis
-
IEEE Computer Society
-
P. Ammann, J. Pamula, J. A. Street, and R. W. Ritchey, "A host-based approach to network attack chaining analysis," in ACSAC. IEEE Computer Society, 2005, pp. 72-84.
-
(2005)
ACSAC
, pp. 72-84
-
-
Ammann, P.1
Pamula, J.2
Street, J.A.3
Ritchey, R.W.4
-
13
-
-
55849106311
-
On system security metrics and the definition approaches
-
IEEE
-
A. Hecker, "On system security metrics and the definition approaches," in SECURWARE. IEEE, 2008, pp. 412-419.
-
(2008)
SECURWARE
, pp. 412-419
-
-
Hecker, A.1
-
14
-
-
34547406946
-
Why to adopt a security metric? A brief survey
-
A. Atzeni and A. Lioy, "Why to adopt a security metric? a brief survey," in QoP2005, First Int. Workshop on Quality of Protection, 2005, pp. 1-12.
-
QoP2005, First Int. Workshop on Quality of Protection, 2005
, pp. 1-12
-
-
Atzeni, A.1
Lioy, A.2
-
17
-
-
70449112560
-
A novel quantitative approach for measuring network security
-
M. S. Ahmed, E. Al-Shaer, and L. Khan, "A novel quantitative approach for measuring network security," in The 27th Conference on Computer Communicationsm, INFOCOM, 2008, pp. 1957-11065
-
The 27th Conference on Computer Communicationsm, INFOCOM, 2008
, pp. 1957-11065
-
-
Ahmed, M.S.1
Al-Shaer, E.2
Khan, L.3
-
18
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
R. Ortalo, Y. Deswarte, and M. Kaâniche, "Experimenting with quantitative evaluation tools for monitoring operational security," IEEE Trans. Software Eng., vol. 25, no. 5, pp. 633-650, 1999.
-
(1999)
IEEE Trans. Software Eng.
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
19
-
-
35148844598
-
Validating and restoring defense in depth using attack graphs
-
R. Lippmann, K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham, "Validating and restoring defense in depth using attack graphs," in Proceedings of MILCOM2006, Washington, DC, 2006, pp. 1-10.
-
Proceedings of MILCOM2006, Washington, DC, 2006
, pp. 1-10
-
-
Lippmann, R.1
Ingols, K.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
20
-
-
39049104457
-
Practical attack graph generation for network defense
-
IEEE Computer Society
-
K. Ingols, R. Lippmann, and K. Piwowarski, "Practical attack graph generation for network defense," in ACSAC. IEEE Computer Society, 2006, pp. 121-130.
-
(2006)
ACSAC
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
21
-
-
33846293304
-
Understanding complex network attack graphs through clustered adjacency matrices
-
IEEE Computer Society
-
S. Noel and S. Jajodia, "Understanding complex network attack graphs through clustered adjacency matrices," in ACSAC. IEEE Computer Society, 2005, pp. 160-169.
-
(2005)
ACSAC
, pp. 160-169
-
-
Noel, S.1
Jajodia, S.2
-
22
-
-
56449109390
-
A graph-theoretic visualization approach to network risk analysis
-
VizSEC, ser. J. R. Goodall, G. J. Conti, and K.-L. Ma, Eds., Springer
-
S. O'Hare, S. Noel, and K. Prole, "A graph-theoretic visualization approach to network risk analysis," in VizSEC, ser. Lecture Notes in Computer Science, J. R. Goodall, G. J. Conti, and K.-L. Ma, Eds., vol. 5210. Springer, 2008, pp. 60-67.
-
(2008)
Lecture Notes in Computer Science
, vol.5210
, pp. 60-67
-
-
O'Hare, S.1
Noel, S.2
Prole, K.3
-
23
-
-
56449106688
-
Improving attack graph visualization through data reduction and attack grouping
-
VizSEC, ser. J. R. Goodall, G. J. Conti, and K.-L. Ma, Eds., Springer
-
J. Homer, A. Varikuti, X. Ou, and M. A. McQueen, "Improving attack graph visualization through data reduction and attack grouping," in VizSEC, ser. Lecture Notes in Computer Science, J. R. Goodall, G. J. Conti, and K.-L. Ma, Eds., vol. 5210. Springer, 2008, pp. 68-79.
-
(2008)
Lecture Notes in Computer Science
, vol.5210
, pp. 68-79
-
-
Homer, J.1
Varikuti, A.2
Ou, X.3
McQueen, M.A.4
-
24
-
-
85084161090
-
Detecting stepping stones
-
Berkeley, CA, USA: USENIX Association
-
Y. Zhang and V. Paxson, "Detecting stepping stones," in SSYM'00: Proceedings of the 9th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2000, pp. 13-13.
-
(2000)
SSYM'00: Proceedings of the 9th Conference on USENIX Security Symposium
, pp. 13-13
-
-
Zhang, Y.1
Paxson, V.2
-
25
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in RAID, 2002, pp. 17-35.
-
(2002)
RAID
, pp. 17-35
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
|