메뉴 건너뛰기




Volumn 2639, Issue , 2003, Pages 715-718

Colored petri net based attack modeling

Author keywords

[No Author keywords available]

Indexed keywords

FUZZY SETS; GRANULAR COMPUTING; PETRI NETS; ROUGH SET THEORY; COMPUTER CRIME; COMPUTER SIMULATION; COSTS; FUNCTIONS; INTERNET; RISK ASSESSMENT; SECURITY OF DATA;

EID: 8344285730     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-39205-x_123     Document Type: Conference Paper
Times cited : (11)

References (8)
  • 2
    • 2642540118 scopus 로고    scopus 로고
    • Modeling Internet Attacks, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
    • Academy, West Point, NY, 5-6 June
    • Tidwell, T., Larson, R., Fitch K., and Hale J. Modeling Internet Attacks, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 June, 2001, Pages 54–59.
    • (2001) United States Military , pp. 54-59
    • Tidwell, T.1    Larson, R.2    Fitch, K.3    Hale, J.4
  • 4
    • 84956608854 scopus 로고    scopus 로고
    • Attack Trees. Dr. Dobb's Journal of Software Tools 24, 12 (Dec
    • Schneier, B. Attack Trees. Dr. Dobb's Journal of Software Tools 24, 12 (Dec. 1999), 21-29.
    • (1999) , pp. 21-29
    • Schneier, B.1
  • 7
    • 0034593376 scopus 로고    scopus 로고
    • Attack Net Penetration Testing
    • (Ballycotton, County Cork, Ireland, Sept, ACM SIGSAC, ACM Press
    • McDermott, J. Attack Net Penetration Testing. In The 2000 New Security Paradigms Workshop (Ballycotton, County Cork, Ireland, Sept. 2000), ACM SIGSAC, ACM Press, pp. 15-22.
    • (2000) In the 2000 New Security Paradigms Workshop , pp. 15-22
    • McDermott, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.