-
2
-
-
63049119374
-
Guide for Developing Performance Metrics for Information Security
-
May
-
Chew, E., Clay, A., Hash, J., Bartol, N., Brown, A.: Guide for Developing Performance Metrics for Information Security. NIST Special Publication 800-80 (May 2006)
-
(2006)
NIST Special Publication 800-80
-
-
Chew, E.1
Clay, A.2
Hash, J.3
Bartol, N.4
Brown, A.5
-
4
-
-
77953698571
-
-
Idaho National Laboratory Report to the Department of Homeland Security, INL/EXT-06-12016, December 2006
-
Idaho National Laboratory Report to the Department of Homeland Security, INL/EXT-06-12016, Cyber Security Metrics (December 2006)
-
Cyber Security Metrics
-
-
-
6
-
-
33749647455
-
Time-to-compromise Model for Cyber Risk Reduction Estimation
-
September
-
McQueen, M.A., Boyer, W.F., Flynn, M.A., Beitel, G.A.: Time-to-compromise Model for Cyber Risk Reduction Estimation. In: First Workshop on Quality of Protection (September 2005)
-
(2005)
First Workshop on Quality of Protection
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
7
-
-
33749639831
-
Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System
-
January
-
McQueen, M.A., Boyer, W.F., Flynn, M.A., Beitel, G.A.: Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System. In: Proceedings of the 39th Hawaii International Conference on System Sciences, p. 226 (January 2006)
-
(2006)
Proceedings of the 39th Hawaii International Conference on System Sciences
, pp. 226
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
8
-
-
3543072024
-
An Overview of Issues in Testing Intrusion Detection Systems
-
National Institute of Standards and Technology, Gaithersburg, Maryland June
-
Mell, P., Hu, V., Lippmann, R., Haines, J., Zissman, M.: An Overview of Issues in Testing Intrusion Detection Systems. In: Interagency Report (IR) 7007, National Institute of Standards and Technology, Gaithersburg, Maryland (June 2003)
-
(2003)
Interagency Report (IR) 7007
-
-
Mell, P.1
Hu, V.2
Lippmann, R.3
Haines, J.4
Zissman, M.5
-
11
-
-
34547239511
-
A Scalable approach to Attack Graph Generation
-
Ou, X., Boyer, W., McQueen, M.: A Scalable approach to Attack Graph Generation. In: 13th ACM Conference on Computer and Communications Security, CCS 2006, October 30 - November 3 (2006)
-
13th ACM Conference on Computer and Communications Security, CCS 2006, October 30 - November 3 (2006)
-
-
Ou, X.1
Boyer, W.2
McQueen, M.3
-
12
-
-
77953727107
-
-
Technical Report, NIST, References and Associated Security Control Mappings, Gaithersburg, Maryland March
-
Ross, R., Katzke, S., Johnson, A., Swanson, M., Rogers, G.: System Questionnaire with NIST SP 800-53: Recommended Security Controls for Federal Information Systems, Technical Report, NIST, References and Associated Security Control Mappings, Gaithersburg, Maryland (March 2006)
-
(2006)
System Questionnaire with NIST SP 800-53: Recommended Security Controls for Federal Information Systems
-
-
Ross, R.1
Katzke, S.2
Johnson, A.3
Swanson, M.4
Rogers, G.5
-
13
-
-
12244283592
-
-
Technical Report, National Institute of Standards and Technology (NIST), Gaithersburg, Maryland July
-
Swanson, M., Bartol, N., Sabato, J., Hash, J., Graffo, L.: NIST Special Publication 800-55: Security Metrics Guide for Information Technology Systems, Technical Report, National Institute of Standards and Technology (NIST), Gaithersburg, Maryland (July 2003)
-
(2003)
NIST Special Publication 800-55: Security Metrics Guide for Information Technology Systems
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
14
-
-
0003487308
-
-
Wiley, Chichester
-
Schneier, B.: Secrets & Lies, pp. 367-380. Wiley, Chichester (2000)
-
(2000)
Secrets & Lies
, pp. 367-380
-
-
Schneier, B.1
|