메뉴 건너뛰기




Volumn 6258 LNCS, Issue , 2010, Pages 86-101

Attack and defense modeling with BDMP

Author keywords

Attack trees; BDMP; Risk analysis; Security modeling

Indexed keywords

ATTACK TREE; BDMP; BOOLEAN LOGIC; FULLY INTEGRATED; MODELING FORMALISMS; MODELING POWER; RELIABILITY ENGINEERING; SECURITY MODELING; THEORETICAL FOUNDATIONS; THEORETICAL FRAMEWORK;

EID: 78649281480     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14706-7_7     Document Type: Conference Paper
Times cited : (28)

References (22)
  • 3
    • 0141793198 scopus 로고    scopus 로고
    • A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes
    • Bouissou, M., Bon, J.: A new formalism that combines advantages of fault-trees and Markov models: Boolean logic driven Markov processes. Reliability Engineering & System Safety 82(2), 149-163 (2003)
    • (2003) Reliability Engineering & System Safety , vol.82 , Issue.2 , pp. 149-163
    • Bouissou, M.1    Bon, J.2
  • 5
    • 0002055502 scopus 로고
    • Laplace transform inversion and passage time distributions in Markov processes
    • Harrison, P.: Laplace transform inversion and passage time distributions in Markov processes. Journal of applied probability 27(1), 74-87 (1990)
    • (1990) Journal of Applied Probability , vol.27 , Issue.1 , pp. 74-87
    • Harrison, P.1
  • 6
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Soft. Engineering 23(4), 235-245 (1997)
    • (1997) IEEE Trans. Soft. Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 8
    • 34047168454 scopus 로고    scopus 로고
    • Project Report ESC-TR-2005-054, Massachusetts Institute of Technology (MIT), Lincoln Laboratory March
    • Lippmann, R., Ingols, K.: An annotated review of past papers on attack graphs. Project Report ESC-TR-2005-054, Massachusetts Institute of Technology (MIT), Lincoln Laboratory (March 2005)
    • (2005) An Annotated Review of Past Papers on Attack Graphs
    • Lippmann, R.1    Ingols, K.2
  • 10
    • 33745849657 scopus 로고    scopus 로고
    • Foundations of attack trees
    • Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
    • Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3935 , pp. 186-198
    • Mauw, S.1    Oostdijk, M.2
  • 13
    • 0042674276 scopus 로고    scopus 로고
    • Approximate sensitivity analysis for acyclic Markov reliability models
    • Ou, Y., Dugan, J.B.: Approximate sensitivity analysis for acyclic Markov reliability models. IEEE Transactions on Reliability 52(2), 220-230 (2003)
    • (2003) IEEE Transactions on Reliability , vol.52 , Issue.2 , pp. 220-230
    • Ou, Y.1    Dugan, J.B.2
  • 14
    • 54949112031 scopus 로고    scopus 로고
    • Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
    • Patel, S.C., Graham, J.H., Ralston, P.A.: Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements. Int. Journal of Information Management 28(6), 483-491 (2008)
    • (2008) Int. Journal of Information Management , vol.28 , Issue.6 , pp. 483-491
    • Patel, S.C.1    Graham, J.H.2    Ralston, P.A.3
  • 18
    • 71849094936 scopus 로고    scopus 로고
    • PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
    • In Press, Corrected Proof May
    • Pudar, S., Manimaran, G., Liu, C.: PENET: a practical method and tool for integrated modeling of security attacks and countermeasures. Computers & Security In Press, Corrected Proof (May 2009)
    • (2009) Computers & Security
    • Pudar, S.1    Manimaran, G.2    Liu, C.3
  • 21
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb's Journal 12(24), 21-29 (1999)
    • (1999) Dr. Dobb's Journal , vol.12 , Issue.24 , pp. 21-29
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.