-
1
-
-
77955417822
-
A probabilistic relational model for security risk analysis
-
Mar.
-
T. Sommestad, M. Ekstedt, and P. Johnson, "A probabilistic relational model for security risk analysis," Comput. Security, vol. 29, no. 6, pp. 659-679, Mar. 2010.
-
(2010)
Comput. Security
, vol.29
, Issue.6
, pp. 659-679
-
-
Sommestad, T.1
Ekstedt, M.2
Johnson, P.3
-
2
-
-
47849098175
-
Probabilistic relational models
-
L. Getoor and B. Taskar, Eds. Cambridge, MA MIT Press
-
B. Taskar et al., "Probabilistic relational models," in Introduction to Statistical Relational Learning, L. Getoor and B. Taskar, Eds. Cambridge, MA: MIT Press, 2007, pp. 129-175.
-
(2007)
Introduction to Statistical Relational Learning
, pp. 129-175
-
-
Taskar, B.1
-
3
-
-
77950875313
-
Quantified security is a weak hypothesis: A critical survey of results and assumptions
-
V. Verendel, "Quantified security is a weak hypothesis: A critical survey of results and assumptions," in Proc. New Security Paradigms Workshop, 2009, pp. 37-49.
-
(2009)
Proc. New Security Paradigms Workshop
, pp. 37-49
-
-
Verendel, V.1
-
5
-
-
12244283592
-
Security metrics guide for information technology systems
-
NIST Special Publication Gaithersburg MD
-
M. Swanson et al., "Security metrics guide for information technology systems," National Instit. Standards Technol., NIST Special Publication 800-55, Gaithersburg, MD, 2003.
-
(2003)
National Instit. Standards Technol.
, pp. 800-855
-
-
Swanson, M.1
-
6
-
-
0006964066
-
-
Dr. Dobb's J Dec [Online]. Available
-
B. Schneier, "Attack trees: Modeling security threats," Dr. Dobb's J., Dec. 1999 [Online]. Available: http://www.drdobbs.com/attacktrees/ 184411129?queryText=%2522attack%2Btree%2522
-
(1999)
Attack Trees: Modeling Security Threats
-
-
Schneier, B.1
-
7
-
-
33750958509
-
Defense trees for economic evaluation of security investments
-
DOI 10.1109/ARES.2006.46, 1625338, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
S. Bistarelli, F. Fioravanti, and P. Peretti, "Defense trees for economic evaluation of security investments," in Proc. 1st Int. Conf. Availability Reliability Security, 2006, pp. 416-423. (Pubitemid 44732672)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 416-423
-
-
Bistarelli, S.1
Fioravanti, F.2
Peretti, P.3
-
8
-
-
77954331938
-
Beyond attack trees: Dynamic security modeling with Boolean logic driven Markov processes (BDMP)
-
L. Piètre-Cambacédès and M. Bouissou, "Beyond attack trees: Dynamic security modeling with Boolean logic driven Markov processes (BDMP)," in Proc. Eur. Dependable Comput. Conf., 2010, pp. 199-208.
-
(2010)
Proc. Eur. Dependable Comput. Conf
, pp. 199-208
-
-
Piètre-Cambacédès, L.1
Bouissou, M.2
-
10
-
-
1142293428
-
A natural extension of Tropos methodology for modelling security
-
H. Mouratidis, P. Giorgini, G. Manson, and I. Philp, "A natural extension of Tropos methodology for modelling security," in Proc. Agent Oriented Methodol. Workshop, 2002, pp. 1-10.
-
(2002)
Proc. Agent Oriented Methodol. Workshop
, pp. 1-10
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
Philp, I.4
-
11
-
-
49049102990
-
Quantitative assessment of enterprise security system
-
Mar
-
R. Breu, F. Innerhofer-Oberperfler, and A. Yautsiukhin, "Quantitative assessment of enterprise security system," in Proc. 3rd Int. Conf. Availability Reliab. Security, Mar. 2008, pp. 921-928.
-
(2008)
Proc. 3rd Int. Conf. Availability Reliab. Security
, pp. 921-928
-
-
Breu, R.1
Innerhofer-Oberperfler, F.2
Yautsiukhin, A.3
-
12
-
-
77953017028
-
A risk assessment model for voting systems using threat trees and Monte Carlo simulation
-
H. Pardue, J. Landry, and A. Yasinsac, "A risk assessment model for voting systems using threat trees and Monte Carlo simulation," in Proc. 1st Int. Workshop Requirements Eng. e-Voting Syst. (RE-VOTE'09), 2010, pp. 55-60.
-
(2010)
Proc. 1st Int. Workshop Requirements Eng. E-Voting Syst. (RE-VOTE'09)
, pp. 55-60
-
-
Pardue, H.1
Landry, J.2
Yasinsac, A.3
-
13
-
-
80054859870
-
E-voting risk assessment
-
H. Pardue, J. P. Landry, and A. Yasinsac, "E-voting risk assessment," Int. J. Inform. Security Privacy, vol. 5, no. 3, pp. 19-35, 2011.
-
(2011)
Int. J. Inform. Security Privacy
, vol.5
, Issue.3
, pp. 19-35
-
-
Pardue, H.1
Landry, J.P.2
Yasinsac, A.3
-
14
-
-
51049107864
-
-
Version 2.0, Forum of Incident Response and Security Teams
-
P. Mell, K. Scarfone, and S. Romanosky, A Complete Guide to the Common Vulnerability Scoring System (CVSS), Version 2.0, Forum of Incident Response and Security Teams, 2007.
-
(2007)
A Complete Guide to the Common Vulnerability Scoring System (CVSS)
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
15
-
-
84882594747
-
-
Boston, MA Springer
-
M. A. McQueen, W. F. Boyer, M. A. Flynn, and G. A. Beitel, Quality of Protection, vol. 23. Boston, MA: Springer, 2006, pp. 49-64.
-
(2006)
Quality of Protection
, vol.23
, pp. 49-64
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
16
-
-
47949125750
-
-
Ph.D. dissertation, Dept. Ind. Inform. Control Syst., Royal Instit. Technol., Stockholm, Sweden
-
E. Johansson, "Assessment of enterprise information security: How to make it credible and efficient," Ph.D. dissertation, Dept. Ind. Inform. Control Syst., Royal Instit. Technol., Stockholm, Sweden, 2005.
-
(2005)
Assessment of Enterprise Information Security: How to Make It Credible and Efficient
-
-
Johansson, E.1
-
18
-
-
84880573811
-
Toward unifying vulnerability information for attack graph construction
-
S. Roschke et al., "Toward unifying vulnerability information for attack graph construction," in Proc. 12th Int. Conf. Information Security, 2009, p. 233.
-
(2009)
Proc. 12th Int. Conf. Information Security
, pp. 233
-
-
Roschke, S.1
-
20
-
-
17744373483
-
-
Ph.D. dissertation Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA
-
O. M. Sheyner, "Scenario graphs and attack graphs," Ph.D. dissertation, Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA, 2004.
-
(2004)
Scenario Graphs and Attack Graphs
-
-
Sheyner, O.M.1
-
21
-
-
84880570206
-
-
M. Eng. thesis, Dept. Electr. Eng. Comput. Sci., Massachusetts Instit. Technol., Cambridge, MA
-
R. Lippmann, "Netspa: A network security planning architecture," M.Eng. thesis, Dept. Electr. Eng. Comput. Sci., Massachusetts Instit. Technol., Cambridge, MA, 2002.
-
(2002)
Netspa: A Network Security Planning Architecture
-
-
Lippmann, R.1
-
22
-
-
35148844598
-
Validating and restoring defense in depth using attack graphs
-
R. Lippmann et al., "Validating and restoring defense in depth using attack graphs," in Proc. MILCOM, 2006, p. 10.
-
(2006)
Proc. MILCOM
, pp. 10
-
-
Lippmann, R.1
-
24
-
-
66249091938
-
Advances in Topological Vulnerability Analysis
-
IEEE
-
S. Noel et al., Advances in Topological Vulnerability Analysis. Washington D.C.: IEEE, 2009, pp. 124-129.
-
(2009)
Washington D.C.
, pp. 124-129
-
-
Noel, S.1
-
25
-
-
56449105709
-
GARNET: A graphical attack graph and reachability network evaluation tool
-
K. Prole, Ed. Heidelberg/Berlin, Germany Springer
-
R. P. Lippmann and L. L. C. Williams, "GARNET: A graphical attack graph and reachability network evaluation tool," in Visualization for Computer Security, K. Prole, Ed. Heidelberg/Berlin, Germany: Springer, 2008, pp. 44-59.
-
(2008)
Visualization for Computer Security
, pp. 44-59
-
-
Lippmann, R.P.1
Williams, L.L.C.2
-
26
-
-
78149430881
-
Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR
-
M. Chu et al., "Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR," in Proc.7th Int. Symp. Visualization Cyber Security, 2010, pp. 22-33.
-
(2010)
Proc.7th Int. Symp. Visualization Cyber Security
, pp. 22-33
-
-
Chu, M.1
-
27
-
-
57049131581
-
Identifying critical attack assets in dependency attack graphs
-
R. Sawilla and X. Ou, "Identifying critical attack assets in dependency attack graphs," in Proc. 13th Eur. Symp. Res. Comput. Security, 2008, pp. 18-34.
-
(2008)
Proc. 13th Eur. Symp. Res. Comput. Security
, pp. 18-34
-
-
Sawilla, R.1
Ou, X.2
-
28
-
-
81855177321
-
A quantitative evaluation of vulnerability scanning
-
H. Holm et al., "A quantitative evaluation of vulnerability scanning," Inform. Manage. Comput. Security, vol. 19, no. 4, pp. 231-247, 2011.
-
(2011)
Inform. Manage. Comput. Security
, vol.19
, Issue.4
, pp. 231-247
-
-
Holm, H.1
-
29
-
-
84881143298
-
Guide to industrial control systems (ICS) security recommendations of the national institute of standards and technology
-
Gaithersburg MD
-
K. Stouffer, J. Falco, and K. Kent, "Guide to industrial control systems (ICS) security recommendations of the National Institute of Standards and Technology," NIST Special Publication 800-82, Gaithersburg, MD, 2008.
-
(2008)
NIST Special Publication 800-82
-
-
Stouffer, K.1
Falco, J.2
Kent, K.3
-
30
-
-
77950793246
-
Modeling modern network attacks and countermeasures using attack graphs
-
K. Ingols et al., "Modeling modern network attacks and countermeasures using attack graphs," in Proc. Annu. Comput. Security Appl. Conf., 2009, pp. 117-126.
-
(2009)
Proc. Annu. Comput. Security Appl. Conf
, pp. 117-126
-
-
Ingols, K.1
-
33
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Apr
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms," ACM SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, p. 39, Apr. 2004.
-
(2004)
ACM SIGCOMM Comput. Commun. Rev
, vol.34
, Issue.2
, pp. 39
-
-
Mirkovic, J.1
Reiher, P.2
-
35
-
-
34247546866
-
A comparison of publicly available tools for dynamic buffer overflow prevention
-
J. Wilander and M. Kamkar, "A comparison of publicly available tools for dynamic buffer overflow prevention," in Proc. 10th Network Distributed Syst. Security Symp., 2003, pp. 149-162.
-
(2003)
Proc. 10th Network Distributed Syst. Security Symp
, pp. 149-162
-
-
Wilander, J.1
Kamkar, M.2
-
36
-
-
84946237235
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
C. Cowan et al., "Buffer overflows: Attacks and defenses for the vulnerability of the decade," in Foundations of Intrusion Tolerant Systems, 2003
-
(2003)
Foundations of Intrusion Tolerant Systems
-
-
Cowan, C.1
-
38
-
-
84865210534
-
Countermeasures against buffer overflow attacks
-
N. Frykholm, "Countermeasures against buffer overflow attacks," RSA Tech. Note, 2000, pp. 1-9.
-
(2000)
RSA Tech. Note
, pp. 1-9
-
-
Frykholm, N.1
-
40
-
-
70349158778
-
-
Ph.D. dissertation Dept. Computerwetenschappen, Katholieke Univ. Leuven, Leuven, Belgium
-
Y. Younan, "Efficient countermeasures for software vulnerabilities due to memory management errors," Ph.D. dissertation, Dept. Computerwetenschappen, Katholieke Univ. Leuven, Leuven, Belgium, 2008.
-
(2008)
Efficient Countermeasures for Software Vulnerabilities Due to Memory Management Errors
-
-
Younan, Y.1
-
41
-
-
38849143105
-
Advances in password cracking
-
DOI 10.1007/s11416-007-0064-y, SSTIC 2007 Special Issue
-
S. Marechal, "Advances in password cracking," J. Comput. Virol., vol. 4, no. 1, pp. 73-81, 2007. (Pubitemid 351207809)
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.1
, pp. 73-81
-
-
Marechal, S.1
-
42
-
-
77953306210
-
Password strength: An empirical analysis
-
M. Dell' Amico et al., "Password strength: An empirical analysis," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Dell'Amico, M.1
-
43
-
-
85001728633
-
Password security: An empirical investigation into e-commerce passwords and their crack times
-
Dec
-
J. A. Cazier and B. D. Medlin, "Password security: An empirical investigation into e-commerce passwords and their crack times," Inform. Syst. Security, vol. 15, no. 6, pp. 45-55, Dec. 2006.
-
(2006)
Inform. Syst. Security
, vol.15
, Issue.6
, pp. 45-55
-
-
Cazier, J.A.1
Medlin, B.D.2
-
44
-
-
84868377366
-
-
Mar. 3 [Online] Available
-
Free Rainbow Tables. (2012, Mar. 3) [Online]. Available: http://www. freerainbowtables.com/
-
(2012)
Free Rainbow Tables
-
-
-
45
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
Nov
-
J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," ACM Trans. Inf. Syst. Security, vol. 3, no. 4, pp. 262-294, Nov. 2000.
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
47
-
-
84857973207
-
Effort estimates for vulnerability discovery projects
-
T. Sommestad, H. Holm, and M. Ekstedt, "Effort estimates for vulnerability discovery projects," in Proc. 45th Hawaii Int. Conf. Syst. Sci., 2012, pp. 5564-5573.
-
(2012)
Proc. 45th Hawaii Int. Conf. Syst. Sci
, pp. 5564-5573
-
-
Sommestad, T.1
Holm, H.2
Ekstedt, M.3
-
48
-
-
84861873854
-
Estimates of success rates of remote arbitrary code execution attacks
-
T. Sommestad, H. Holm, and M. Ekstedt, "Estimates of success rates of remote arbitrary code execution attacks," Inform. Manage. Comput. Security, vol. 20, no. 2, pp. 107-122, 2012.
-
(2012)
Inform. Manage. Comput. Security
, vol.20
, Issue.2
, pp. 107-122
-
-
Sommestad, T.1
Holm, H.2
Ekstedt, M.3
-
49
-
-
84856180318
-
Estimates of success rates of denial-of-service attacks
-
T. Sommestad, H. Holm, and M. Ekstedt, "Estimates of success rates of denial-of-service attacks," in Proc. TrustCom, 2011, pp. 21-28.
-
(2011)
Proc. TrustCom
, pp. 21-28
-
-
Sommestad, T.1
Holm, H.2
Ekstedt, M.3
-
51
-
-
38149037931
-
TU Delft expert judgment data base
-
May
-
R. Cooke, "TU Delft expert judgment data base," Reliab. Eng. Syst. Safety, vol. 93, no. 5, pp. 657-674, May 2008.
-
(2008)
Reliab. Eng. Syst. Safety
, vol.93
, Issue.5
, pp. 657-674
-
-
Cooke, R.1
-
52
-
-
84880573803
-
Exploiting network configuration mistakes: Practitioners self-assessed success rate
-
069, Stockholm, Sweden
-
T. Sommestad, "Exploiting network configuration mistakes: Practitioners self-assessed success rate," Royal Instit. Technol., Tech. Rep. TRITA-EE 2011:069, Stockholm, Sweden, 2011.
-
(2011)
Royal Instit. Technol., Tech. Rep. TRITA-EE 2011
-
-
Sommestad, T.1
-
53
-
-
79959599477
-
Security mistakes in information system deployment projects
-
T. Sommestad et al., "Security mistakes in information system deployment projects," Inform. Manage. Comput. Security, vol. 19, no. 2, pp. 80-94, 2011.
-
(2011)
Inform. Manage. Comput. Security
, vol.19
, Issue.2
, pp. 80-94
-
-
Sommestad, T.1
-
54
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
Jun
-
A. Wool, "A quantitative study of firewall configuration errors," Computer, vol. 37, no. 6, pp. 62-67, Jun. 2004.
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
-
56
-
-
84880573964
-
-
Manhasset, NY June 7
-
S. Stasiukonis, "Social engineering, the USB way," Dark Reading, Manhasset, NY, June 7, 2006.
-
(2006)
Social Engineering, the USB Way Dark Reading
-
-
Stasiukonis, S.1
-
57
-
-
34848911641
-
Social phishing
-
DOI 10.1145/1290958.1290968, 1290968
-
T. N. Jagatic et al., "Social phishing," Commun. ACM, vol. 50, no. 10, pp. 94-100, Mar. 2007. (Pubitemid 47505005)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
58
-
-
33845523685
-
Using phishing for user email security awareness
-
DOI 10.1007/0-387-33406-8-41, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
-
R. Dodge and A. Ferguson, "Using phishing for user email security awareness," in Security and Privacy in Dynamic Environments, vol. 201, S. Fischer-Hübner, K. Rannenberg, L. Yngström, and S. Lindskog, Eds. Boston, MA: Springer, 2006, pp. 454-459. (Pubitemid 44920678)
-
(2006)
IFIP International Federation for Information Processing
, vol.201
, pp. 454-459
-
-
Dodge, R.C.1
Ferguson, A.J.2
-
59
-
-
84880573378
-
-
Mar. 21 [Online] Available
-
M. Buschle. (2012. Mar. 21). KTH The Enterprise Architecture Tool [Online]. Available: http://www.kth.se/ees/omskolan/organisation/avdelningar/ ics/research/eat
-
(2012)
KTH the Enterprise Architecture Tool
-
-
Buschle, M.1
-
60
-
-
0027539718
-
Expert system verification and validation: A survey and tutorial
-
Feb
-
R. M. O'Keefe and D. E. O'Leary, "Expert system verification and validation: A survey and tutorial," Artif. Intell. Rev., vol. 7, no. 1, pp. 3-42, Feb. 1993.
-
(1993)
Artif. Intell. Rev
, vol.7
, Issue.1
, pp. 3-42
-
-
O'Keefe, R.M.1
O'Leary, D.E.2
-
61
-
-
79551528427
-
A tool for enterprise architecture analysis using the PRM Formalism
-
P. Soffer and E. Proper, Eds. Berlin/Heidelberg, Germany Springer
-
M. Buschle, J. Ullberg, U. Franke, R. Lagerström, and T. Sommestad, "A tool for enterprise architecture analysis using the PRM Formalism," in Information Systems Evolution, vol. 72, P. Soffer and E. Proper, Eds. Berlin/Heidelberg, Germany: Springer, 2011, pp. 108-121.
-
(2011)
Information Systems Evolution
, vol.72
, pp. 108-121
-
-
Buschle, M.1
Ullberg, J.2
Franke, U.3
Lagerström, R.4
Sommestad, T.5
-
62
-
-
0037556508
-
GeNIe: A development environment for graphical decision-analytic models
-
M. J. Druzdzel, "GeNIe: A development environment for graphical decision-analytic models," in Proc. Ann. Symp. American Medical Informatics Assoc., 1999, p. 1206.
-
(1999)
Proc. Ann. Symp. American Medical Informatics Assoc
, pp. 1206
-
-
Druzdzel, M.J.1
-
63
-
-
0027577726
-
Formal validation of a knowledge-based system using a variation of the turning test
-
DOI 10.1016/0957-4174(93)90008-T
-
R. Agarwal, R. Kannan, and M. Tanniru, "Formal validation of a knowledge-based system using a variation of the Turing test," Expert Syst. Appl., vol. 6, no. 2, pp. 181-192, Apr. 1993. (Pubitemid 23680020)
-
(1993)
Expert Systems with Applications
, vol.6
, Issue.2
, pp. 181-192
-
-
Agarwal Ritu1
Kannan Ramu2
Tanniru Mohan3
-
65
-
-
84861175015
-
A tool for automatic enterprise architecture modeling
-
S. Nurcan, Ed. Berlin/Heidelberg, Germany Springer
-
M. Buschle, H. Holm, T. Sommestad, M. Ekstedt, and K. Shahzad, "A tool for automatic enterprise architecture modeling," in IS Olympics: Information Systems in a Diverse World, vol. 107, S. Nurcan, Ed. Berlin/Heidelberg, Germany: Springer, 2012, pp. 1-15.
-
(2012)
IS Olympics: Information Systems in A Diverse World
, vol.107
, pp. 1-15
-
-
Buschle, M.1
Holm, H.2
Sommestad, T.3
Ekstedt, M.4
Shahzad, K.5
-
66
-
-
34250003707
-
The contemporary software security landscape
-
DOI 10.1109/MSP.2007.73
-
D. Ahmad, "The contemporary software security landscape," IEEE Security Privacy Mag., vol. 5, no. 3, pp. 75-77, May 2007. (Pubitemid 46883440)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 75-77
-
-
Ahmad, D.1
|