-
1
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Washington, DC, November
-
P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002.
-
(2002)
Proceedings of 9th ACM Conference on Computer and Communications Security
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
3
-
-
84944406286
-
Counterexample-guided abstraction refinement
-
E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample- guided abstraction refinement. In Proceedingsof Computer Aided Verification (CAV), volume 1855, pages 154-169, 2000.
-
(2000)
Proceedingsof Computer Aided Verification (CAV)
, vol.1855
, pp. 154-169
-
-
Clarke, E.1
Grumberg, O.2
Jha, S.3
Lu, Y.4
Veith, H.5
-
5
-
-
0012945946
-
Models and tools for quantitative assessment of operational security
-
M. Dacier, Y. Deswarte, and M. Kaaniche. Models and tools for quantitative assessment of operational security. In IFIP SEC, 1996.
-
(1996)
IFIP SEC
-
-
Dacier, M.1
Deswarte, Y.2
Kaaniche, M.3
-
14
-
-
39049104457
-
Practical attack graph generation for network defense
-
Miami Beach, Florida, December
-
K. Ingols, R. Lippmann, and K. Piwowarski. Practical attack graph generation for network defense. In 22nd Annual Computer Security Applications Conference (ACSAC), Miami Beach, Florida, December 2006.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC)
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
15
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
V. Kumar, J. Srivastava, and A. Lazarevic, editors, chapter 5. Kluwer Academic Publisher
-
S. Jajodia, S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challanges, chapter 5. Kluwer Academic Publisher, 2003.
-
(2003)
Managing Cyber Threats: Issues, Approaches and Challanges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
16
-
-
84948760464
-
Two formal analyses of attack graphs
-
Nova Scotia, Canada, June
-
S. Jha, O. Sheyner, and J. M. Wing. Two formal analyses of attack graphs. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, pages 49-63, Nova Scotia, Canada, June 2002.
-
(2002)
Proceedings of the 15th IEEE Computer Security Foundations Workshop
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.M.3
-
18
-
-
35148893877
-
Evaluating and strengthening enterprise network security using attack graphs
-
MIT Lincoln Laboratory, October
-
R. P. Lippmann, K. W. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham. Evaluating and strengthening enterprise network security using attack graphs. Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, October 2005.
-
(2005)
Technical Report ESC-TR-2005-064
-
-
Lippmann, R.P.1
Ingols, K.W.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
19
-
-
26444568158
-
Zchaff2004: An efficient SAT solver
-
Theory and Applications of Satisfiability Testing: 7th International Conference, SAT 2004. Revised Selected Papers
-
Y. S. Mahajan, Z. Fu, and S. Malik. Zchaff2004: An efficient SAT solver. In Lecture Notes in Computer Science SAT2004 Special Volume, pages 360-375. LNCS 3542, 2004. (Pubitemid 41422894)
-
(2005)
Lecture Notes in Computer Science
, vol.3542
, pp. 360-375
-
-
Mahajan, Y.S.1
Fu, Z.2
Malik, S.3
-
22
-
-
0036576020
-
Search pruning techniques in SAT-based branch-and-bound algorithms for the binate covering problem
-
DOI 10.1109/43.998623, PII S0278007002028488
-
V. M. Manquinho and J. ao P. Marques-Silva. Search pruning techniques in SAT-based branch-and-bound algorithmsfor the binate covering problem. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 21:505-516, 2002. (Pubitemid 34630864)
-
(2002)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.21
, Issue.5
, pp. 505-516
-
-
Manquinho, V.M.1
Marques-Silva, J.P.2
-
23
-
-
38149024063
-
Ranking attack graphs
-
September
-
V. Mehta, C. Bartzis, H. Zhu, E. Clarke, and J. Wing. Ranking attack graphs. In Proceedings of Recent Advances in Intrusion Detection (RAID), September 2006.
-
(2006)
Proceedings of Recent Advances in Intrusion Detection (RAID)
-
-
Mehta, V.1
Bartzis, C.2
Zhu, H.3
Clarke, E.4
Wing, J.5
-
29
-
-
34547239511
-
A scalable approach to attack graph generation
-
DOI 10.1145/1180405.1180446, 1180446, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
X. Ou, W. F. Boyer, and M. A. McQueen. A scalable approach to attack graph generation. In 13th ACM Conference on Computer and Communications Security (CCS), pages 336-345, 2006. (Pubitemid 47131381)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 336-345
-
-
Ou, X.1
Boyer, W.F.2
McQueen, M.A.3
-
34
-
-
70449480067
-
-
National Infrastructure Advisory Council (NIAC)
-
M. Schiffman, G. Eschelbeck, D. Ahmad, A. Wright, and S. Romanosky. CVSS: A Common Vulnerability Scoring System. National Infrastructure Advisory Council (NIAC), 2004.
-
(2004)
CVSS: A Common Vulnerability Scoring System
-
-
Schiffman, M.1
Eschelbeck, G.2
Ahmad, D.3
Wright, A.4
Romanosky, S.5
-
35
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 254-265, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 254-265
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
36
-
-
77950904346
-
An attack graph-based probabilistic security metric
-
L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia. An attack graph-based probabilistic security metric. In Proceedings of The 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'08), 2008.
-
(2008)
Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'08)
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
37
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
DOI 10.1016/j.comcom.2006.06.018, PII S0140366406002271
-
L. Wang, S. Noel, and S. Jajodia. Minimum-cost network hardening using attack graphs. Computer Communications, 29:3812-3824, November 2006. (Pubitemid 44751132)
-
(2006)
Computer Communications
, vol.29
, Issue.18
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
|