-
1
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo R, Deswarte Y, Kaâniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 1999; 25(5): 633-650.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
3
-
-
71749094137
-
-
Dependability and security models. In Proceedings of DRCN, IEEE, 2009, 11-20.
-
Trivedi KS, Kim DS, Roy A, Medhi D. Dependability and security models. In Proceedings of DRCN, IEEE, 2009, 11-20.
-
-
-
Trivedi, K.S.1
Kim, D.S.2
Roy, A.3
Medhi, D.4
-
4
-
-
84864293182
-
-
Evaluating information security investments from attackers perspective: the Return-On-Attack (ROA). In Proceedings of Fourth Workshop on the Economics of Information Security
-
Cremonini M, Martini P. Evaluating information security investments from attackers perspective: the Return-On-Attack (ROA). In Proceedings of Fourth Workshop on the Economics of Information Security, 2005.
-
(2005)
-
-
Cremonini, M.1
Martini, P.2
-
5
-
-
33947420435
-
A risk-driven security analysis method and modelling language
-
Kearney P, Brügger L. A risk-driven security analysis method and modelling language. BT Technology Journal 2007; 25(1): 141-153.
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 141-153
-
-
Kearney, P.1
Brügger, L.2
-
7
-
-
84947612185
-
-
Attack Modeling for Information Security and Survivability," CMU/SEI-2001-TN-001
-
Moore AP, Ellison RJ, Linger RC. "Attack Modeling for Information Security and Survivability, " CMU/SEI-2001-TN-001, 2001.
-
(2001)
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
9
-
-
33750958509
-
-
Defense trees for economic evaluation of security investments. In Proceedings of ARES
-
Bistarelli S, Peretti P, Trubitsyna I. Defense trees for economic evaluation of security investments. In Proceedings of ARES, 2006; 8-15.
-
(2006)
, pp. 8-15
-
-
Bistarelli, S.1
Peretti, P.2
Trubitsyna, I.3
-
10
-
-
70450092394
-
-
RRE: a game-theoretic intrusion response and recovery engine. In Proceedings of DSN
-
Zonouz SA, Khurana H, Sanders WH, Yardley TM. RRE: a game-theoretic intrusion response and recovery engine. In Proceedings of DSN, 2009; 439-448.
-
(2009)
, pp. 439-448
-
-
Zonouz, S.A.1
Khurana, H.2
Sanders, W.H.3
Yardley, T.M.4
-
11
-
-
84947615620
-
-
The optimal control of partially observable Markov processes," Ph.D. dissertation, Stanford Univ. Electronics Labs
-
Sondik E. "The optimal control of partially observable Markov processes, " Ph.D. dissertation, Stanford Univ. Electronics Labs, 1971.
-
(1971)
-
-
Sondik, E.1
-
12
-
-
0004007187
-
-
Kluwer Academic: Norwell, Massachusetts, USA
-
Sahner R, Trivedi KS, Puliafito A. Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Kluwer Academic: Norwell, Massachusetts, USA, 1999.
-
(1999)
Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package
-
-
Sahner, R.1
Trivedi, K.S.2
Puliafito, A.3
-
14
-
-
84864293189
-
-
An Attack Tree for the Border Gateway Protocol. Cisco Internet Draft
-
Convery S, Cook D, Franz M. An Attack Tree for the Border Gateway Protocol. Cisco Internet Draft, 2002.
-
(2002)
-
-
Convery, S.1
Cook, D.2
Franz, M.3
-
15
-
-
84864302708
-
-
Supervisory Control and Data Acquisition (SCADA) Systems. The Critical Infrastructure Protection Report 1.6
-
Baker GH, Berg A. Supervisory Control and Data Acquisition (SCADA) Systems. The Critical Infrastructure Protection Report 1.6, 2002.
-
(2002)
-
-
Baker, G.H.1
Berg, A.2
-
16
-
-
33646134102
-
Developing an insider threat model using functional decomposition
-
LNCS 3685
-
Butts J, Mills R, Baldwin R. Developing an insider threat model using functional decomposition. Computer Network Security 2005; LNCS 3685: 412-417.
-
(2005)
Computer Network Security
, pp. 412-417
-
-
Butts, J.1
Mills, R.2
Baldwin, R.3
-
17
-
-
84864293190
-
-
A system security engineering process. In Proceedings of the 14th National Computer Security Conference
-
Weiss JD. A system security engineering process. In Proceedings of the 14th National Computer Security Conference, 1991.
-
(1991)
-
-
Weiss, J.D.1
-
20
-
-
84860434875
-
-
A structural framework for modeling multi-stage network attacks. In Proceedings of ICPPW
-
Daley K, Larson R, Dawkins J. A structural framework for modeling multi-stage network attacks. In Proceedings of ICPPW, 2002; 1530-1536.
-
(2002)
, pp. 1530-1536
-
-
Daley, K.1
Larson, R.2
Dawkins, J.3
-
22
-
-
84947613232
-
-
A Framework for Analyzing and Mitigating the Vulnerabilities of Complex Systems via Attack and Protection Trees," Ph.D. dissertation, Air Force Institute of Technology
-
Edge KS. "A Framework for Analyzing and Mitigating the Vulnerabilities of Complex Systems via Attack and Protection Trees, " Ph.D. dissertation, Air Force Institute of Technology, 2007.
-
(2007)
-
-
Edge, K.S.1
-
23
-
-
47349092109
-
-
A novel security risk evaluation for information systems. In Proceedings of FCST
-
Gan Z, Tang J, Wu P, Varadharajan V. A novel security risk evaluation for information systems. In Proceedings of FCST, 2007; 67-73.
-
(2007)
, pp. 67-73
-
-
Gan, Z.1
Tang, J.2
Wu, P.3
Varadharajan, V.4
-
24
-
-
84864301460
-
-
Border gateway protocol security: Recommendations of the national institute of standards and technology. NIST Special Publication 800-54
-
Kuhn R, Sriram K, Montgomery D. Border gateway protocol security: Recommendations of the national institute of standards and technology. NIST Special Publication 800-54, 2007.
-
(2007)
-
-
Kuhn, R.1
Sriram, K.2
Montgomery, D.3
-
25
-
-
34548704917
-
-
Accurate real-time identification of IP prefix hijacking. In Proceedings of IEEE S & P
-
Hu X, Mao ZM. Accurate real-time identification of IP prefix hijacking. In Proceedings of IEEE S & P, 2007; 3-17.
-
(2007)
, pp. 3-17
-
-
Hu, X.1
Mao, Z.M.2
-
26
-
-
0030104164
-
Comparing the importance of system components by some structural characteristics
-
Meng FC. Comparing the importance of system components by some structural characteristics. IEEE Transactions on Reliability, 1996; 45(1): 59-65.
-
(1996)
IEEE Transactions on Reliability
, vol.45
, Issue.1
, pp. 59-65
-
-
Meng, F.C.1
-
27
-
-
84989674615
-
Optimal arrangement of components via pairwise rearrangements
-
Boland PJ, Proschan F, Tong YL. Optimal arrangement of components via pairwise rearrangements. Naval Research Logistics 1989; 36(6): 807-815.
-
(1989)
Naval Research Logistics
, vol.36
, Issue.6
, pp. 807-815
-
-
Boland, P.J.1
Proschan, F.2
Tong, Y.L.3
-
28
-
-
0037261651
-
-
Importance analysis with Markov chains. In Proceedings of Reliability and Maintainability Symposium IEEE
-
Fricks RM, Trivedi KS. Importance analysis with Markov chains. In Proceedings of Reliability and Maintainability Symposium IEEE, 2003; 89-95.
-
(2003)
, pp. 89-95
-
-
Fricks, R.M.1
Trivedi, K.S.2
-
30
-
-
84947611454
-
-
A. Technologies, quot;Securitree,"
-
A. Technologies, "Securitree, " 2002.
-
(2002)
-
-
-
31
-
-
84947616451
-
-
A Practical Approach to Threat Modeling," Erudio Security, LLC, Tech. Rep.
-
Olzak T. "A Practical Approach to Threat Modeling, " Erudio Security, LLC, Tech. Rep., 2006.
-
(2006)
-
-
Olzak, T.1
-
32
-
-
0001162212
-
On The Importance of Different Components in a Multicomponent System
-
In, Krishnaiah PR, ed). Academic Press: New York, NY, USA
-
Birnbaum ZW. On The Importance of Different Components in a Multicomponent System. In Multivariate Analysis - II, Krishnaiah PR, (ed). Academic Press: New York, NY, USA, 1969; 581-592
-
(1969)
Multivariate Analysis - II
, pp. 581-592
-
-
Birnbaum, Z.W.1
-
33
-
-
42749101387
-
-
Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection. In Proceedings of CCST
-
Higuero MV, Unzilla JJ, Jacob E, Saiz P, Aguado M, Luengo D. Application of 'attack trees' in security analysis of digital contents e-commerce protocols with copyright protection. In Proceedings of CCST, 2005; 57-60.
-
(2005)
, pp. 57-60
-
-
Higuero, M.V.1
Unzilla, J.J.2
Jacob, E.3
Saiz, P.4
Aguado, M.5
Luengo, D.6
-
34
-
-
84864318235
-
-
Modeling network attacks. In Proceedings of 12th Conference on Behavior Representation in Modeling and Simulation
-
Lathrop S, Hill J, Surdu J. Modeling network attacks. In Proceedings of 12th Conference on Behavior Representation in Modeling and Simulation, 2003; 401-407.
-
(2003)
, pp. 401-407
-
-
Lathrop, S.1
Hill, J.2
Surdu, J.3
-
35
-
-
84947614302
-
-
I. Software, quot;Attacktree+,"
-
I. Software, "Attacktree+, " 2007.
-
(2007)
-
-
-
36
-
-
84864302711
-
-
Modeling internet attacks. In Proceedings of the 2001 IEEE Workshop on Information Assurance and security, IEEE
-
Tidwell T, Larson R, Fitch K, Hale J. Modeling internet attacks. In Proceedings of the 2001 IEEE Workshop on Information Assurance and security, vol. 59. IEEE, 2001.
-
(2001)
, vol.59
-
-
Tidwell, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
|