-
1
-
-
69949151630
-
-
viewed 01 March 2012
-
CPE, 2012. Common Platform Enumeration, viewed 01 March 2012, 〈http://cpe.mitre.org/〉.
-
(2012)
Common Platform Enumeration
-
-
-
3
-
-
84867646261
-
-
viewed 01 March 2012
-
CVSS,2012. Common Vulnerability Scoring System, viewed 01 March 2012, 〈http://www.first.org/cvss/〉.
-
(2012)
Common Vulnerability Scoring System
-
-
-
5
-
-
4544270125
-
Impact analysis of faults and attacks in large-scale networks
-
Hariri, S., Qu, G., Dharmagadda, T., Ramkishore, M., Raghavendra C. S., 2003. Impact Analysis of Faults and Attacks in Large-Scale Networks. In IEEE Security and Privacy, vol.1 pp.49-54.
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 49-54
-
-
Hariri, S.1
Qu, G.2
Dharmagadda, T.3
Ramkishore, M.4
Raghavendra, C.S.5
-
6
-
-
10444280417
-
A large-scale distributed intrusion detection framework based on attack strategy analysis
-
Louvain-la-Neuve, Belgium
-
Huang, M.-Y., Wicks, T. M., 1998. A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis. In First International Workshop on the Recent Advances in Intrusion Detection, Raid'98, Louvain-la-Neuve, Belgium.
-
(1998)
First International Workshop on the Recent Advances in Intrusion Detection, Raid'98
-
-
Huang, M.-Y.1
Wicks, T.M.2
-
7
-
-
77950793246
-
Modeling modern network attacks and countermeasures using attack graphs
-
Washington, D.C., USA, IEEE Computer Society
-
Ingols, K., Chu, M., Lippmann, R., Webster, S., Boyer, S., 2009. Modeling modern network attacks and countermeasures using attack graphs. In Proceedings of the 2009 Annual Computer Security Applications Conference (ACSAC '09), Washington, D.C., USA, IEEE Computer Society.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference (ACSAC '09)
-
-
Ingols, K.1
Chu, M.2
Lippmann, R.3
Webster, S.4
Boyer, S.5
-
8
-
-
78049413993
-
A service dependency model for costsensitive intrusion response
-
Athens, Greece
-
Kheir, N., Cuppens-Boulahia, N., Cuppens F. and Debar H., 2010. A service dependency model for costsensitive intrusion response. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), Athens, Greece.
-
(2010)
Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS)
-
-
Kheir, N.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Debar, H.4
-
9
-
-
33845226805
-
Attack graph based evaluation of network security
-
Kotenko, I., Stepashkin, M., 2006. Attack Graph based Evaluation of Network Security. In Lecture Notes in Computer Science, Vol. 4237, pp.216-227.
-
(2006)
Lecture Notes in Computer Science
, vol.4237
, pp. 216-227
-
-
Kotenko, I.1
Stepashkin, M.2
-
10
-
-
79955005138
-
Security analysis of computer-aided systems taking into account social engineering attacks
-
Los Alamitos, California. IEEE Computer Society
-
Kotenko, I., Stepashkin, M., Doynikova, E., 2011. Security Analysis of Computer-aided Systems taking into account Social Engineering Attacks In Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011), Los Alamitos, California. IEEE Computer Society, pp.611-618.
-
(2011)
Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP 2011)
, pp. 611-618
-
-
Kotenko, I.1
Stepashkin, M.2
Doynikova, E.3
-
11
-
-
35148844598
-
Validating and restoring defense in depth using attack graphs
-
Washington, DC
-
Lippmann, R., Ingols, K., 2006. Validating and Restoring Defense in Depth Using Attack Graphs. In Proceedings of MILCOM 2006. Washington, DC.
-
(2006)
Proceedings of MILCOM 2006
-
-
Lippmann, R.1
Ingols, K.2
-
12
-
-
84867631478
-
-
viewed 01 March 2012
-
MSM, 2012. Making Security Measurable, viewed 01 March 2012, http://measurablesecurity.mitre.org/index.html〉.
-
(2012)
Making Security Measurable
-
-
-
13
-
-
84867654586
-
-
viewed 01 March 2012
-
MASSIF, 2012. Massif project, viewed 01 March 2012, 〈http://www. massif-project.eu〉
-
(2012)
Massif Project
-
-
-
14
-
-
84864700045
-
-
McGraw-Hill Companies. 2011
-
Miller, D. R., Harris, Sh., Harper, A. A., VanDyke, S., Black, Ch. 2011. Security Information and Event Management (SIEM) Implementation. McGraw-Hill Companies. 2011. 430 p.
-
(2011)
Security Information and Event Management (SIEM) Implementation.
, pp. 430
-
-
Miller, D.R.1
Harris, Sh.2
Harper, A.A.3
Van Dyke, S.4
Black, Ch.5
-
16
-
-
84944727025
-
Efficient minimum-cost network hardening via exploit dependency graphs
-
Noel, S., Jajodia, S., O'Berry, B., Jacobs, M., 2003. Efficient minimum-cost network hardening via exploit dependency graphs. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC'03).
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC'03)
-
-
Noel, S.1
Jajodia, S.2
O'berry, B.3
Jacobs, M.4
-
17
-
-
59449108823
-
-
viewed 01 March 2012
-
NVD, 2012. National Vulnerability Database viewed 01 March 2012, 〈http://nvd.nist.gov/〉
-
(2012)
National Vulnerability Database
-
-
-
18
-
-
77950904346
-
An attack graph-based probabilistic security metric
-
Wang, L., Islam, T., Long, T., Singhal, A., Jajodia, S., 2008. An attack graph-based probabilistic security metric. In Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'08).
-
(2008)
Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'08)
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
19
-
-
78049376027
-
K-zero day safety: Measuring the security risk of networks against unknown attacks
-
Springer-Verlag, Berlin, Heidelberg
-
Wang, L., Jajodia, S., Singhal, A., Noel, S., 2010. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. In ESORICS'10 Proceedings of the 15th European conference on Research in computer security. Springer-Verlag, Berlin, Heidelberg, pp.573-587.
-
(2010)
ESORICS'10 Proceedings of the 15th European Conference on Research in Computer Security
, pp. 573-587
-
-
Wang, L.1
Jajodia, S.2
Singhal, A.3
Noel, S.4
-
20
-
-
80455138343
-
Unified parametrizable attack tree
-
Wang, L., Whitley, J. N., Phan, R. C. W., Parish, D. J., 2011. Unified Parametrizable Attack Tree. In International Journal for Information Security Research, Vol.1 (1), pp. 20-26.
-
(2011)
International Journal for Information Security Research
, vol.1
, Issue.1
, pp. 20-26
-
-
Wang, L.1
Whitley, J.N.2
Phan, R.C.W.3
Parish, D.J.4
|