메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Toward hybrid attack dependency graphs

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK GRAPH; CONTINUOUS STATE; CONTINUOUS-DOMAIN; DEPENDENCY GRAPHS; EXTENDED ABSTRACTS; MODELING FRAMEWORKS;

EID: 84862860564     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2179298.2179368     Document Type: Conference Paper
Times cited : (12)

References (15)
  • 1
    • 0000050873 scopus 로고
    • Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems
    • R. Alur, C. Courcoubetis, T. Henzinger, and P. Ho. Hybrid automata: An algorithmic approach to the specification and verification of hybrid systems. Hybrid systems, pages 209-229, 1993.
    • (1993) Hybrid Systems , pp. 209-229
    • Alur, R.1    Courcoubetis, C.2    Henzinger, T.3    Ho, P.4
  • 7
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • S. Jajodia, S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. Managing Cyber Threats, pages 247-266, 2005.
    • (2005) Managing Cyber Threats , pp. 247-266
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 10
    • 84866944011 scopus 로고    scopus 로고
    • Technical report, National Science Foundation
    • Report: Cyber-physical systems summit. Technical report, National Science Foundation, 2008.
    • (2008) Report: Cyber-physical Systems Summit


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.