-
1
-
-
81455156587
-
-
SSE-CMM, http://www.sse-cmm.org/metric/metric.asp, 2010.
-
(2010)
SSE-CMM
-
-
-
2
-
-
81455151016
-
-
MITRE CVE July 2010
-
http://www.cve.mitre.org, MITRE CVE, July 2010.
-
-
-
-
3
-
-
0002067431
-
Netstat: A network-based intrusion detection system
-
G. Vigna and R. Kemmerer, "Netstat: A Network-Based Intrusion Detection System," J. Computer Security, vol. 7, 1999.
-
(1999)
J. Computer Security
, vol.7
-
-
Vigna, G.1
Kemmerer, R.2
-
5
-
-
33750934506
-
System security analysis/certication methodology and results
-
C. Weissman, "System Security Analysis/Certication Methodology and Results," Technical Report SDC SP-3728, 1973.
-
(1973)
Technical Report SDC SP-3728
-
-
Weissman, C.1
-
7
-
-
35148844598
-
Validating and restoring defense in depth using attack graphs
-
Oct.
-
R. Lippmann, K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham, "Validating and Restoring Defense in Depth Using Attack Graphs," Proc. Military Communications Conf., Oct. 2006.
-
(2006)
Proc. Military Communications Conf.
-
-
Lippmann, R.1
Ingols, K.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
8
-
-
34547454437
-
A weakest-adversary security metric for network configuration security analysis
-
DOI 10.1145/1179494.1179502, Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
J. Pamula, S. Jajodia, P. Ammann, and V. Swarup, "A Weakest-Adversary Security Metric for Network Configuration Security Analysis," Proc. Second ACM Workshop Quality of Protection, pp. 31-38, 2006. (Pubitemid 47165622)
-
(2006)
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 31-38
-
-
Pamula, J.1
Jajodia, S.2
Ammann, P.3
Swarup, V.4
-
10
-
-
24944500947
-
Risk management using behavior based bayesian networks
-
Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005. Proceedings
-
R. Dantu and P. Kolan, "Risk Management Using Behavior Based Bayesian Networks," Intelligence and Security Informatics, pp. 115-126, 2005. (Pubitemid 41314426)
-
(2005)
Lecture Notes in Computer Science
, vol.3495
, pp. 115-126
-
-
Dantu, R.1
Kolan, P.2
-
11
-
-
50249085983
-
An attack graph-based probabilistic security metric
-
L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, "An Attack Graph-Based Probabilistic Security Metric," Proc. Data and Applications Security (DAS '08), pp. 283-296, 2008.
-
(2008)
Proc. Data and Applications Security (DAS '08)
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
12
-
-
37849021677
-
Measuring overall security of network configurations using attack graphs
-
Aug.
-
L. Wang, A. Singhal, and S. Jajodia, "Measuring Overall Security of Network Configurations Using Attack Graphs," Data and Applications Security XXI, vol. 4602, pp. 98-112, Aug. 2007.
-
(2007)
Data and Applications Security XXI
, vol.4602
, pp. 98-112
-
-
Wang, L.1
Singhal, A.2
Jajodia, S.3
-
13
-
-
33845524230
-
Common vulnerability scoring system
-
P. Mell, K. Scarfone, and S. Romanosky, "Common Vulnerability Scoring System," IEEE Security and Privacy, vol. 4, pp. 85-89, Nov./Dec. 2006. (Pubitemid 44925881)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.6
, pp. 85-89
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
15
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
DOI 10.1109/32.815323
-
R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Trans. Software Eng., vol. 25, pp. 633-650, Sept. 1999. (Pubitemid 30541841)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
16
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Apr.
-
E. Jonsson and T. Olovsson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior," IEEE Trans. Software Eng., Apr. 1997.
-
(1997)
IEEE Trans. Software Eng.
-
-
Jonsson, E.1
Olovsson, T.2
-
18
-
-
39049104457
-
Practical attack graph generation for network defense
-
DOI 10.1109/ACSAC.2006.39, 4041160, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
K. Ingols, R. Lippmann, and K. Piwowarski, "Practical Attack Graph Generation for Network Defense," Proc. Computer Security Applications Conf., pp. 121-130, Dec. 2006. (Pubitemid 351232908)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
20
-
-
33749520206
-
Multiple coordinated views for network attack graphs
-
DOI 10.1109/VIZSEC.2005.1532071, 1532071, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
S. Noel, M. Jacobs, P. Kalapa, and S. Jajodia, "Multiple Coordinated Views for Network Attack Graphs," Proc. IEEE Workshop Visualization for Computer Security, pp. 99-106, 2005. (Pubitemid 44523253)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 99-106
-
-
Noel, S.1
Jacobs, M.2
Kalapa, P.3
Jajodia, S.4
-
21
-
-
17644397602
-
Laplace and the indifference principle in the essai philosophique des probabilits
-
P. Dupount, "Laplace and the Indifference Principle in the 'Essai Philosophique Des Probabilits'," Rend. Sem. Mat. Univ. Politec. Torino, vol. 36, pp. 125-137, 1977/78.
-
(1977)
Rend. Sem. Mat. Univ. Politec. Torino
, vol.36
, pp. 125-137
-
-
Dupount, P.1
|