-
1
-
-
0033299558
-
Simulating cyber attacks, defences, and consequences
-
Cohen, F.: Simulating cyber attacks, defences, and consequences. Computers & Security 18(6), 479-518 (1999)
-
(1999)
Computers & Security
, vol.18
, Issue.6
, pp. 479-518
-
-
Cohen, F.1
-
2
-
-
70449517238
-
An intrusion response decision-making model based on hierarchical task network planning
-
Mu, C., Li, Y.: An intrusion response decision-making model based on hierarchical task network planning. Expert Systems with Applications 37(3), 2465-2472 (2010)
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.3
, pp. 2465-2472
-
-
Mu, C.1
Li, Y.2
-
4
-
-
27644574459
-
Informing the decision process in an automated intrusion response system
-
Papadaki, M., Furnell, S.M.: Informing the decision process in an automated intrusion response system. Information Security Technical Report 10(3), 150-161 (2005)
-
(2005)
Information Security Technical Report
, vol.10
, Issue.3
, pp. 150-161
-
-
Papadaki, M.1
Furnell, S.M.2
-
5
-
-
34548775838
-
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
-
Stakhanova, N., Basu, S., Wong, J.: A Cost-Sensitive Model for Preemptive Intrusion Response Systems. In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Niagara Falls, Canada, pp. 428-435 (2007)
-
(2007)
21st International Conference on Advanced Information Networking and Applications (AINA 2007), Niagara Falls, Canada
, pp. 428-435
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
6
-
-
27544503196
-
ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment
-
Foo, B., Wu, Y.S., Mao, Y.C., Bagchi, S., Spafford, E.: ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment. In: International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, pp. 508-517 (2005)
-
(2005)
International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan
, pp. 508-517
-
-
Foo, B.1
Wu, Y.S.2
Mao, Y.C.3
Bagchi, S.4
Spafford, E.5
-
7
-
-
84863939610
-
A Risk Index Model for Security Incident Prioritisation
-
Anuar, N.B., Furnell, S., Papadaki, M., Clarke, N.: A Risk Index Model for Security Incident Prioritisation. In: 9th Australian Information Security Management Conference, Perth, Australia, pp. 25-39 (2011)
-
(2011)
9th Australian Information Security Management Conference, Perth, Australia
, pp. 25-39
-
-
Anuar, N.B.1
Furnell, S.2
Papadaki, M.3
Clarke, N.4
-
10
-
-
78149489905
-
An investigation and survey of response options for Intrusion Response Systems (IRSs)
-
Johannesburg, South Africa
-
Anuar, N.B., Papadaki, M., Furnell, S., Clarke, N.: An investigation and survey of response options for Intrusion Response Systems (IRSs). In: Information Security for South Africa (ISSA), Johannesburg, South Africa, pp. 1-8 (2010)
-
(2010)
Information Security for South Africa (ISSA)
, pp. 1-8
-
-
Anuar, N.B.1
Papadaki, M.2
Furnell, S.3
Clarke, N.4
-
11
-
-
33845524230
-
Common Vulnerability Scoring System
-
Mell, P., Scarfone, K., Romanosky, S.: Common Vulnerability Scoring System. IEEE Security & Privacy 4(6), 85-89 (2006)
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.6
, pp. 85-89
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
|