-
1
-
-
85165850239
-
Return on security investment
-
Aceituno, V.: Return on security investment. ISSA Jounal 1, 16-19 (2006)
-
(2006)
ISSA Jounal
, vol.1
, pp. 16-19
-
-
Aceituno, V.1
-
2
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proc. 9th ACM Conf. on Computer and Communications Security, pp. 217-224 (2002)
-
(2002)
Proc. 9th ACM Conf. on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
3
-
-
35148826283
-
-
Ph. D. thesis, Cambrdige: Massachusetts Institute of Technology, May
-
Artz, M. L.: A Network Security Planning Architecture. Ph. D. thesis, Cambrdige: Massachusetts Institute of Technology (May 2002)
-
(2002)
A Network Security Planning Architecture
-
-
Artz, M.L.1
-
4
-
-
35248836533
-
Using specification-based intrusion detection for automated response
-
Vigna, G., Krügel, C., Jonsson, E. eds., Springer, Heidelberg
-
Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using specification-based intrusion detection for automated response. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 136-154. Springer, Heidelberg (2003)
-
(2003)
RAID 2003. LNCS
, vol.2820
, pp. 136-154
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.4
-
5
-
-
33645799476
-
Anticorrelation as a criterion to select appropriate counter-measures in an intrusion detection framework
-
Cuppens, F., Autrel, F., Yacine Bouzida, J. G., Gombault, S., Sans, T.: Anticorrelation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annals of Telecommunications 61, 197-217 (2006)
-
(2006)
Annals of Telecommunications
, vol.61
, pp. 197-217
-
-
Cuppens, F.1
Autrel, F.2
Bouzida, Y.J.G.3
Gombault, S.4
Sans, T.5
-
6
-
-
2542607810
-
Quantitative assessment of operational security: Models and tools
-
May
-
Dacier, M., Deswarte, Y., Kaaniche, M.: Quantitative assessment of operational security: models and tools. Tech. Rep. 96493, LAAS (May 1996)
-
(1996)
Tech. Rep. 96493, LAAS
-
-
Dacier, M.1
Deswarte, Y.2
Kaaniche, M.3
-
8
-
-
34547465100
-
Enabling automated threat response through the use of a dynamic security policy
-
Debar, H., Thomas, Y., Cuppens, F., Cuppens-Boulahia, N.: Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology 3, 195-210 (2007)
-
(2007)
Journal in Computer Virology
, vol.3
, pp. 195-210
-
-
Debar, H.1
Thomas, Y.2
Cuppens, F.3
Cuppens-Boulahia, N.4
-
9
-
-
27544503196
-
Adepts: Adaptive intrusion response using attack graphs in an e-commerce environment
-
Foo, B., Wu, Y. S., Mao, Y. C., Bagchi, S., Spafford, E.: Adepts: Adaptive intrusion response using attack graphs in an e-commerce environment. In: Proc. Intr'l Conf. DSN, pp. 508-517 (2005)
-
(2005)
Proc. Intr'l Conf. DSN
, pp. 508-517
-
-
Foo, B.1
Wu, Y.S.2
Mao, Y.C.3
Bagchi, S.4
Spafford, E.5
-
11
-
-
85116520518
-
Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response
-
Jajodia, S., Noel, S.: Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response. Algorithms, Architectures and Information Systems Security 1, 285-305 (2007)
-
(2007)
Algorithms, Architectures and Information Systems Security
, vol.1
, pp. 285-305
-
-
Jajodia, S.1
Noel, S.2
-
12
-
-
70350658278
-
A service dependency modeling framework for policy-based response enforcement
-
Flegel, U., Bruschi, D. eds., Springer, Heidelberg
-
Kheir, N., Debar, H., Cuppens, F., Cuppens-Boulahia, N., Viinikka, J.: A service dependency modeling framework for policy-based response enforcement. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 174-193. Springer, Heidelberg (2009)
-
(2009)
DIMVA 2009. LNCS
, vol.5587
, pp. 174-193
-
-
Kheir, N.1
Debar, H.2
Cuppens, F.3
Cuppens-Boulahia, N.4
Viinikka, J.5
-
13
-
-
78649240251
-
Cost assessment for intrusion response using dependency graphs
-
Kheir, N., Debar, H., Cuppens-Boulahia, N., Cuppens, F., Viinikka, J.: Cost assessment for intrusion response using dependency graphs. In: Proc. IFIP Intrn'l Conf. N2S (2009)
-
Proc. IFIP Intrn'l Conf. N2S (2009)
-
-
Kheir, N.1
Debar, H.2
Cuppens-Boulahia, N.3
Cuppens, F.4
Viinikka, J.5
-
14
-
-
84896692772
-
The practitioner's guide to coloured petri nets
-
Kristensen, L. M., Christensen, S., Jensen, K.: The practitioner's guide to coloured petri nets. Intr'l Journal Software Tools for Technology Transfer, 98-132 (1998)
-
(1998)
Intr'l Journal Software Tools for Technology Transfer
, pp. 98-132
-
-
Kristensen, L.M.1
Christensen, S.2
Jensen, K.3
-
15
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee, W., Fan, W., Miller, M., Stolfo, S. J., Zadok, E.: Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 10, 5-22 (2002)
-
(2002)
Journal of Computer Security
, vol.10
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
16
-
-
84948440714
-
Design of a role-based trust-management framework
-
Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: Proc. IEEE Symp. on Security and Privacy, p. 114 (2002)
-
(2002)
Proc. IEEE Symp. on Security and Privacy
, pp. 114
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
17
-
-
85165861857
-
Internet explorer vulnerable to hackers, warn experts. microsoft and avg warn of danger
-
March
-
McMillan, R.: Internet explorer vulnerable to hackers, warn experts. microsoft and avg warn of danger. TechWorld magazine (March 2010)
-
(2010)
TechWorld Magazine
-
-
McMillan, R.1
-
19
-
-
78049389822
-
-
Microsoft: Why microsoft dynamics for high-tech and electronics manufacturers
-
Microsoft: Why microsoft dynamics for high-tech and electronics manufacturers? Microsoft Dynamics CRM
-
Microsoft Dynamics CRM
-
-
-
20
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rajab, M. A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proc. 6th ACM Conf. Internet measurement, pp. 41-52 (2006)
-
(2006)
Proc. 6th ACM Conf. Internet Measurement
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
22
-
-
0030086382
-
Role-based access control models
-
Sandhu, R. S., Coynek, E. J., Feinsteink, H. L., Youmank, C. E.: Role-based access control models. IEEE Computer 29, 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coynek, E.J.2
Feinsteink, H.L.3
Youmank, C.E.4
-
23
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J. M.: Automated generation and analysis of attack graphs. In: IEEE Symp. Security & Privacy (2002)
-
(2002)
IEEE Symp. Security & Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
24
-
-
34548776459
-
A taxonomy of intrusion response systems
-
Stakhanova, N., Basu, S., Wong, J.: A taxonomy of intrusion response systems. Intr'l Journal of Information and Computer Security 1, 169-184 (2007)
-
(2007)
Intr'l Journal of Information and Computer Security
, vol.1
, pp. 169-184
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
25
-
-
77952350259
-
Intrusion response cost assessment methodology
-
Strasburg, C., Stakhanova, N., Basu, S., Wong, J. S.: Intrusion response cost assessment methodology. In: Proc. ACM Symp. ASIACCS, pp. 388-391 (2009)
-
(2009)
Proc. ACM Symp. ASIACCS
, pp. 388-391
-
-
Strasburg, C.1
Stakhanova, N.2
Basu, S.3
Wong, J.S.4
-
26
-
-
84948979531
-
Evaluating the impact of automated intrusion response mechanisms
-
Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: Proc. 18th Annual Conf. ACSAC (2002)
-
(2002)
Proc. 18th Annual Conf. ACSAC
-
-
Toth, T.1
Kruegel, C.2
|