-
2
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Nov. Washington, DC, USA
-
P. Ammann, et al. Scalable, Graph-based Network Vulnerability Analysis, 9th ACM Conf. on Computer and Communications security, Nov. 2002, Washington, DC, USA
-
(2002)
9th ACM Conf. on Computer and Communications Security
-
-
Ammann, P.1
-
5
-
-
0001094070
-
The use of the CCTA risk analysis and management methodology CRAMM
-
B. Barber, J. Davey, The use of the CCTA risk analysis and management methodology CRAMM. Proc. MEDINFO92, North Holland, 1589 pp.1593, 1992.
-
(1992)
Proc. MEDINFO92, North Holland
, vol.1589
, pp. 1593
-
-
Barber, B.1
Davey, J.2
-
9
-
-
34047168454
-
An annotated review of past paper on attack graphs
-
Lincoln Lab. MIT, March
-
R.P. Lipmann, K.W. Ingols, An Annotated Review of Past Paper on Attack Graphs, Project Report, Lincoln Lab. MIT, March 2005.
-
(2005)
Project Report
-
-
Lipmann, R.P.1
Ingols, K.W.2
-
11
-
-
84948760464
-
Two formal analysis of attack graphs
-
June
-
S. Jha, O. Sheyner, J. Wing, Two Formal Analysis of Attack Graphs, 15th IEEE Computer Security Foundations Workshop, p.49, June 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 49
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
13
-
-
67349118743
-
The common vulnerability scoring system
-
National Infrastructure Advisory Council, Oct
-
National Infrastructure Advisory Council, The Common Vulnerability Scoring System, Final Report and Recomandations, Oct. 2004
-
(2004)
Final Report and Recomandations
-
-
-
14
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Nov, Washington, DC, USA
-
P. Ning, et al., Constructing attack scenarios through correlation of intrusion alerts, 9th ACM Conf. on Computer and Communications Security, Nov. 2002, Washington, DC, USA.
-
(2002)
9th ACM Conf. on Computer and Communications Security
-
-
Ning, P.1
-
16
-
-
84948965481
-
Representing TCP/IP connectivity for topological analysis of network security
-
Dec
-
R. Ritchey, et al., Representing TCP/IP Connectivity For Topological Analysis of Network Security, 18th Annual Computer Security Applications Conf, p.25, Dec. 2002.
-
(2002)
18th Annual Computer Security Applications Conf
, pp. 25
-
-
Ritchey, R.1
-
20
-
-
84964504906
-
Computer-attack graph generation tool
-
June
-
L.P. Swiler, C. Phillips, D. Ellis, S. Chakerian, Computer-Attack Graph Generation Tool, Proc. of the DARPA Information Survivability Conf, June 2001.
-
(2001)
Proc. of the DARPA Information Survivability Conf
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
21
-
-
56149108997
-
Rule-based topological vulnerability analysis
-
S. Petersburg Sept
-
V. Swarup, S. Jajodia, J. Pamula, Rule-Based Topological Vulnerability Analysis, 3rd Int. Wor. on Math. Methods, Models and Arc. for Network Security, S. Petersburg Sept. 2005.
-
(2005)
3rd Int. Wor. on Math. Methods, Models and Arc. for Network Security
-
-
Swarup, V.1
Jajodia, S.2
Pamula, J.3
|