-
2
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
B. Madan, K. Goseva-Popstojanova, K. Vaidyanathan, and K.S. Trivedi A method for modeling and quantifying the security attributes of intrusion tolerant systems Performance Evaluation Journal 56 1-4 2004 167 186
-
(2004)
Performance Evaluation Journal
, vol.56
, Issue.14
, pp. 167-186
-
-
Madan, B.1
Goseva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
3
-
-
38949137343
-
-
IEEE March 16-19, IEEE CS Press
-
D.J. Leversage, E. James, Estimating a System's Mean Time-to-Compromise, Security & Privacy, IEEE March 16-19, IEEE CS Press, 2008, pp. 52-60.
-
(2008)
Estimating a System's Mean Time-to-Compromise, Security & Privacy
, pp. 52-60
-
-
Leversage, D.J.1
James, E.2
-
4
-
-
80055043688
-
Model-based security metrics using ADversary View security evaluation (ADVISE)
-
Aachen, Germany, September 5-8
-
E. LeMay, M.D. Ford, K. Keefe, W.H. Sanders, C. Muehrcke, Model-based security metrics using ADversary View security evaluation (ADVISE), in: Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems (QEST 2011), Aachen, Germany, September 5-8, 2011.
-
(2011)
Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems (QEST 2011)
-
-
Lemay, E.1
Ford, M.D.2
Keefe, K.3
Sanders, W.H.4
Muehrcke, C.5
-
6
-
-
2642526260
-
Security analysis of SITAR intrusion-tolerant system
-
D. Wang, B. Madan, K.S. Trivedi, Security analysis of SITAR intrusion-tolerant system, in: Proc. ACM Workshop on Survivable and Self-Regenerative Systems, 2003, pp. 23-32.
-
(2003)
Proc. ACM Workshop on Survivable and Self-Regenerative Systems
, pp. 23-32
-
-
Wang, D.1
Madan, B.2
Trivedi, K.S.3
-
7
-
-
60449090394
-
On stochastic modeling for integrated security and dependability evaluation
-
K. Sallhammar, B.E. Helvik, and S.J. Knapskog On stochastic modeling for integrated security and dependability evaluation Journal of Networks 1 5 2006
-
(2006)
Journal of Networks
, vol.1
, Issue.5
-
-
Sallhammar, K.1
Helvik, B.E.2
Knapskog, S.J.3
-
8
-
-
16244368460
-
Model-based validation of an intrusion-tolerant information systems
-
Florianpolis, Brazil, October
-
F. Stevens, T. Courtney, S. Singh, A. Agbaria, J.F. Meyer, W.H. Sanders, P. Pal, Model-based validation of an intrusion-tolerant information system, in: Proceedings of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004), Florianpolis, Brazil, October 2004.
-
(2004)
Proceedings of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004)
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Meyer, J.F.5
Sanders, W.H.6
Pal, P.7
-
9
-
-
33749647455
-
Time-to-compromise model for cyber risk reduction estimation
-
Quality of Protection: Security Measurements and Metrics Springer
-
M.A. McQueen, W.F. Boyer, M.A. Flynn, and G.A. Beitel Time-to-compromise model for cyber risk reduction estimation First Workshop on Quality of Protection Quality of Protection: Security Measurements and Metrics 2005 Springer
-
(2005)
First Workshop on Quality of Protection
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
10
-
-
84974774507
-
Towards operational measures of computer security
-
B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, and D. Wright Towards operational measures of computer security Journal of Computer Security 2 1993 211 229
-
(1993)
Journal of Computer Security
, vol.2
, pp. 211-229
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
-
11
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
E. Jonsson, and T. Olovsson A quantitative model of the security intrusion process based on attacker behavior IEEE Transactions on Software Engineering 23 4 1997 235 245
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
12
-
-
0033325475
-
Experiments with quantitative evaluation tools for monitoring operational security
-
R. Ortalo, Y. Deswarte, and M. Kaâniche Experiments with quantitative evaluation tools for monitoring operational security IEEE Transactions on Software Engineering 25 5 1999 635 650
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 635-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
14
-
-
84964425047
-
Characterizing intrusion tolerant systems using a state transition model
-
K. Goseva-Popstojanova, F. Wang, R. Wang, F. Gong, K. Vaidyanathan, K.S. Trivedi, B. Muthusamy, Characterizing intrusion tolerant systems using a state transition model, in: DARPA Information Survivability Conference and Exposition (DISCEX II), vol. 2, 2001, pp. 211-221.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II)
, vol.2
, pp. 211-221
-
-
Goseva-Popstojanova, K.1
Wang, F.2
Wang, R.3
Gong, F.4
Vaidyanathan, K.5
Trivedi, K.S.6
Muthusamy, B.7
-
15
-
-
67249143791
-
Empirical analysis and statistical modelling of attack processes based on honeypotss
-
Philadelphia (USA), June 25-28
-
M. Kaâniche, E. Alata, V. Nicomette, Y. Deswarte, M. Dacier, Empirical analysis and statistical modelling of attack processes based on honeypots, in: Proc. of WEEDS 2006-Workshop on Empirical Evaluation of Dependability and Security, Philadelphia (USA), June 25-28, 2006.
-
(2006)
Proc. of WEEDS 2006-Workshop on Empirical Evaluation of Dependability and Security
-
-
Kaâniche, M.1
-
16
-
-
57849130357
-
Attacker skill level distribution estimation in the system mean time-to-compromise
-
19-21 May ISBN 978-1-4244-2244-9
-
N. Paulauskas, E. Garsva, Attacker skill level distribution estimation in the system mean time-to-compromise, in: Proceedings of 1st International Conference on Information Technology, Gdanks, 19-21 May, 2008, 463-466. ISBN 978-1-4244-2244-9.
-
(2008)
Proceedings of 1st International Conference on Information Technology, Gdanks
, pp. 463-466
-
-
Paulauskas, N.1
Garsva, E.2
-
17
-
-
84879211186
-
A extended stochastic model for quantitative security analyses of networked systems
-
M. Xu, and S. Xu A extended stochastic model for quantitative security analyses of networked systems Internet Mathematics 8 3 2012 288 320
-
(2012)
Internet Mathematics
, vol.8
, Issue.3
, pp. 288-320
-
-
Xu, M.1
Xu, S.2
-
20
-
-
51349093483
-
A novel quantitative approach for measuring network security
-
The 27th Conference on Computer Communications IEEE CS Press
-
M.S. Ahmed, E. Al-Shaer, and L. khan A novel quantitative approach for measuring network security INFOCOM 2008 The 27th Conference on Computer Communications 2008 IEEE CS Press 1957 1965
-
(2008)
INFOCOM 2008
, pp. 1957-1965
-
-
Ahmed, M.S.1
Al-Shaer, E.2
Khan, L.3
-
22
-
-
84879231292
-
On the operational security assurance evaluation of networked IT systems
-
September St Petersburg, Russia
-
A. Hecker, M. Riguidel, On the operational security assurance evaluation of networked IT systems, NEW2AN, September 2009, St Petersburg, Russia.
-
(2009)
NEW2AN
-
-
Hecker, A.1
Riguidel, M.2
-
24
-
-
84860680253
-
Ideal based cyber security technical metrics for control systems
-
W. Boyer, and M. McQueen Ideal based cyber security technical metrics for control systems CRITIS 7 2007 3 5
-
(2007)
CRITIS
, vol.7
, pp. 3-5
-
-
Boyer, W.1
McQueen, M.2
-
25
-
-
84873415291
-
-
Project Report IA-3, MIT Lincoln Laboratory, Lexington, MA, 22 May 2012
-
R. Lippmann, J. Riordan, T. Yu, K. Watson, Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics, Project Report IA-3, MIT Lincoln Laboratory, Lexington, MA, 22 May 2012.
-
Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics
-
-
Lippmann, R.1
Riordan, J.2
Yu, T.3
Watson, K.4
-
26
-
-
50249085983
-
An attack graph-based probabilistic security metric
-
Lecture Notes in Computer Science (LNCS) Springer-Verlag
-
L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia An attack graph-based probabilistic security metric Proc. 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2008) Lecture Notes in Computer Science (LNCS) vol. 5094 2008 Springer-Verlag 283 296
-
(2008)
Proc. 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2008)
, vol.5094
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
27
-
-
84879224628
-
A method for estimation of the success probability of an intrusion process by considering the temporal aspects of the attacker behavior
-
Springer-Verlag ISSN: 0302-9743, ISBN: 978-3-642-01003-3
-
J. Almasizadeh, and M. Abdollahi Azgomi A method for estimation of the success probability of an intrusion process by considering the temporal aspects of the attacker behavior Transactions on Computational Science vol. 4 2009 Springer-Verlag ISSN: 0302-9743, ISBN: 978-3-642-01003-3
-
(2009)
Transactions on Computational Science
, vol.4
-
-
Almasizadeh, J.1
Abdollahi Azgomi, M.2
-
28
-
-
70349679296
-
Intrusion process modeling for security quantification
-
March 16-19, Fukuoka Institute of Technology (FIT), Fukuoka, Japan, IEEE CS Press
-
J. Almasizadeh, M. Abdollahi Azgomi, Intrusion process modeling for security quantification, in: Proc. of the 4th International Conference on Availability, Reliability and Security (ARES'09), March 16-19, Fukuoka Institute of Technology (FIT), Fukuoka, Japan, IEEE CS Press, 2009, pp. 114-121.
-
(2009)
Proc. of the 4th International Conference on Availability, Reliability and Security (ARES'09)
, pp. 114-121
-
-
Almasizadeh, J.1
Abdollahi Azgomi, M.2
-
31
-
-
0036599965
-
System availability with non-exponentially distributed outages
-
Y. Cao, H. Sun, K.S. Trivedi, and J. Han System availability with non-exponentially distributed outages IEEE Transactions on Reliability 51 2 2002 193 198
-
(2002)
IEEE Transactions on Reliability
, vol.51
, Issue.2
, pp. 193-198
-
-
Cao, Y.1
Sun, H.2
Trivedi, K.S.3
Han, J.4
-
34
-
-
39749095474
-
Value driven security threat modeling based on attack path analysis
-
Big Island, Hawaii, January
-
Y. Chen, B. Boehm, L. Sheppard, Value driven security threat modeling based on attack path analysis, in: 40th Hawaii International Conference on Systems Sciences, Big Island, Hawaii, January 2007.
-
(2007)
40th Hawaii International Conference on Systems Sciences
-
-
Chen, Y.1
Boehm, B.2
Sheppard, L.3
-
35
-
-
14344258545
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
P. Liu, W. Zang, Incentive-based modeling and inference of attacker intent, objectives, and strategies, in: Proceedings of the 10th ACM Conference on Computer and Communication Security, 2003, pp. 179-189.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 179-189
-
-
Liu, P.1
Zang, W.2
-
37
-
-
35048885033
-
Tools for generating and analyzing attack graphs
-
O. Sheyner, J. Wing, Tools for generating and analyzing attack graphs, In Proceedings of International Symposium on Formal Methods for Components and Objects, Lecture Notes in Computer Science 3188, 2004, pp. 344-371.
-
(2004)
Proceedings of International Symposium on Formal Methods for Components and Objects, Lecture Notes in Computer Science 3188
, pp. 344-371
-
-
Sheyner, O.1
Wing, J.2
-
38
-
-
0034593179
-
A requires/provides model for computer attacks
-
Ballycotton, County Cork, Ireland
-
J. Steven, K.L. Templeton, A requires/provides model for computer attacks, in: Proc. of the 2000 Workshop on New Security Paradigms, Ballycotton, County Cork, Ireland, 2001, pp. 31-38.
-
(2001)
Proc. of the 2000 Workshop on New Security Paradigms
, pp. 31-38
-
-
Steven, J.1
Templeton, K.L.2
-
40
-
-
33845226805
-
-
CMS 2006, LNCS 4237
-
I. Kotenko, M. Stepashkin, Attack graph based evaluation of network security, CMS 2006, LNCS 4237, 2006, pp. 216-227.
-
(2006)
Attack Graph Based Evaluation of Network Security
, pp. 216-227
-
-
Kotenko, I.1
Stepashkin, M.2
-
41
-
-
35148893877
-
Evaluating and strengthening enterprise network security using attack graphs
-
Lexington, MA ESC-TR-2005-064
-
R.P. Lippmann, K.W. Ingols, C. Scott, K. Piwowarski, K.J. Kratkiewicz, M. Artz, R.K. Cunningham, Evaluating and strengthening enterprise network security using attack graphs, Technical report, MIT Lincoln Laboratory, Lexington, MA, 2005. ESC-TR-2005-064.
-
(2005)
Technical Report, MIT Lincoln Laboratory
-
-
Lippmann, R.P.1
Ingols, K.W.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.J.5
Artz, M.6
Cunningham, R.K.7
-
42
-
-
34547444679
-
-
Technical report, CMU-CS-05-155, School of Computer Science, Carnegie Mellon University, July
-
P. Manadhata, J.M. Wing, An attack surface metric, Technical report, CMU-CS-05-155, School of Computer Science, Carnegie Mellon University, July 2005.
-
(2005)
An Attack Surface Metric
-
-
Manadhata, P.1
Wing, J.M.2
-
43
-
-
50849122332
-
Risk assessment in practice: A real case study
-
M. Benini, and S. Sicari Risk assessment in practice: a real case study Computer Communications 31 2008 3691 3699
-
(2008)
Computer Communications
, vol.31
, pp. 3691-3699
-
-
Benini, M.1
Sicari, S.2
|