-
3
-
-
0141793198
-
A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes
-
Bouissou, M., Bon, J.: A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes. Reliability Engineering & System Safety 82(2), 149-163 (2003)
-
(2003)
Reliability Engineering & System Safety
, vol.82
, Issue.2
, pp. 149-163
-
-
Bouissou, M.1
Bon, J.2
-
4
-
-
0036127460
-
A path-based algorithm to evaluate asymptotic unavailability for large Markov models
-
Bouissou, M., Lefebvre, Y.: A path-based algorithm to evaluate asymptotic unavailability for large Markov models. In: Proc. Reliability and Maintainability Annual Symposium (RAMS 2002), Seattle, USA, pp. 32-39 (2002)
-
(2002)
Proc. Reliability and Maintainability Annual Symposium (RAMS 2002), Seattle, USA
, pp. 32-39
-
-
Bouissou, M.1
Lefebvre, Y.2
-
5
-
-
0002055502
-
Laplace transform inversion and passage time distributions in Markov processes
-
Harrison, P.: Laplace transform inversion and passage time distributions in Markov processes. Journal of applied probability 27(1), 74-87 (1990)
-
(1990)
Journal of Applied Probability
, vol.27
, Issue.1
, pp. 74-87
-
-
Harrison, P.1
-
6
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Soft. Engineering 23(4), 235-245 (1997)
-
(1997)
IEEE Trans. Soft. Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
8
-
-
34047168454
-
-
Project Report ESC-TR-2005-054, Massachusetts Institute of Technology (MIT), Lincoln Laboratory March
-
Lippmann, R., Ingols, K.: An annotated review of past papers on attack graphs. Project Report ESC-TR-2005-054, Massachusetts Institute of Technology (MIT), Lincoln Laboratory (March 2005)
-
(2005)
An Annotated Review of Past Papers on Attack Graphs
-
-
Lippmann, R.1
Ingols, K.2
-
9
-
-
84974774507
-
Towards operational measures of computer security
-
Littlewood, B., Brocklehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J., Gollmann, D.: Towards operational measures of computer security. Journal of Computer Security 2, 211-229 (1993)
-
(1993)
Journal of Computer Security
, vol.2
, pp. 211-229
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Gollmann, D.9
-
10
-
-
33745849657
-
Foundations of attack trees
-
Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
-
Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
12
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: From dependability to security. IEEE Trans. Dependable and Secure Comp. 1(1), 48-65 (2004)
-
(2004)
IEEE Trans. Dependable and Secure Comp.
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
13
-
-
0042674276
-
Approximate sensitivity analysis for acyclic Markov reliability models
-
Ou, Y., Dugan, J.B.: Approximate sensitivity analysis for acyclic Markov reliability models. IEEE Transactions on Reliability 52(2), 220-230 (2003)
-
(2003)
IEEE Transactions on Reliability
, vol.52
, Issue.2
, pp. 220-230
-
-
Ou, Y.1
Dugan, J.B.2
-
14
-
-
54949112031
-
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
-
Patel, S.C., Graham, J.H., Ralston, P.A.: Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements. Int. Journal of Information Management 28(6), 483-491 (2008)
-
(2008)
Int. Journal of Information Management
, vol.28
, Issue.6
, pp. 483-491
-
-
Patel, S.C.1
Graham, J.H.2
Ralston, P.A.3
-
16
-
-
77954331938
-
Beyond attack trees: Dynamic security modeling with Boolean logic Driven Markov Processes (BDMP)
-
April
-
Piètre-Cambacédès, L., Bouissou, M.: Beyond attack trees: dynamic security modeling with Boolean logic Driven Markov Processes (BDMP). In: Proc. 8th European Dependable Computing Conference (EDCC), Valencia, Spain, pp. 119-208 (April 2010)
-
(2010)
Proc. 8th European Dependable Computing Conference (EDCC), Valencia, Spain
, pp. 119-208
-
-
Piètre-Cambacédès, L.1
Bouissou, M.2
-
17
-
-
78649306677
-
Disentangling the relations between safety and security
-
Piètre-Cambacédès, L., Chaudet, C.: Disentangling the relations between safety and security. In: Proc. of the 9th WSEAS Int. Conf. on Applied Informatics and Communications (AIC 2009), WSEAS, Moscow, Russia (August 2009)
-
Proc. of the 9th WSEAS Int. Conf. on Applied Informatics and Communications (AIC 2009), WSEAS, Moscow, Russia (August 2009)
-
-
Piètre-Cambacédès, L.1
Chaudet, C.2
-
18
-
-
71849094936
-
PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
-
In Press, Corrected Proof May
-
Pudar, S., Manimaran, G., Liu, C.: PENET: a practical method and tool for integrated modeling of security attacks and countermeasures. Computers & Security In Press, Corrected Proof (May 2009)
-
(2009)
Computers & Security
-
-
Pudar, S.1
Manimaran, G.2
Liu, C.3
-
21
-
-
0002670359
-
Attack trees: Modeling security threats
-
Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb's Journal 12(24), 21-29 (1999)
-
(1999)
Dr. Dobb's Journal
, vol.12
, Issue.24
, pp. 21-29
-
-
Schneier, B.1
-
22
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
May
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proc. IEEE Symposium on Security and Privacy (S&P 2002), Oakland, USA, pp. 273-284 (May 2002)
-
(2002)
Proc. IEEE Symposium on Security and Privacy (S&P 2002), Oakland, USA
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
|