메뉴 건너뛰기




Volumn 4347 LNCS, Issue , 2006, Pages 235-248

Rational choice of security measures via multi-parameter attack trees

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK TREE; MULTIPARAMETERS; PROBABILITY OF ATTACK; SECURITY MEASURE;

EID: 84885793990     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11962977_19     Document Type: Conference Paper
Times cited : (77)

References (15)
  • 1
    • 3042720722 scopus 로고    scopus 로고
    • Information security: Why the future belongs to the quants
    • Daniel Geer, Kevin Soo Hoo, and Andrew Jaquith. Information security: Why the future belongs to the quants. IEEE Security and Privacy, 1(4):24-32, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 24-32
    • Geer, D.1    Hoo, K.S.2    Jaquith, A.3
  • 3
    • 26444456918 scopus 로고    scopus 로고
    • Potential impacts of a growing gap between theory and practice in information security
    • in LNCS 3524, Springer
    • Yvo Desmedt. Potential impacts of a growing gap between theory and practice in information security. In Information Security and Privacy: 10th Australasian Conference, ACISP 2005, LNCS 3524, pages 532-536. Springer, 2005.
    • (2005) Information Security and Privacy: 10th Australasian Conference, ACISP 2005 , pp. 532-536
    • Desmedt, Y.1
  • 5
    • 0004269078 scopus 로고
    • US Government Printing Office, January. Systems and Reliability Research, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission
    • W.E. Vesely, F.F. Goldberg, N.H. Roberts, and D.F. Haasl. Fault Tree Handbook. US Government Printing Office, January 1981. Systems and Reliability Research, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission.
    • (1981) Fault Tree Handbook.
    • Vesely, W.E.1    Goldberg, F.F.2    Roberts, N.H.3    Haasl, D.F.4
  • 7
    • 0038226150 scopus 로고    scopus 로고
    • Attack modeling for information security and survivability
    • Software Engineering Institute
    • Andrew P. Moore, Robert J. Ellison, and Richard C. Linger. Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-001, Software Engineering Institute, 2001.
    • (2001) Technical Report CMU/SEI-2001-TN-001
    • Moore, A.P.1    Ellison, R.J.2    Linger, R.C.3
  • 8
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • Bruce Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, 24(12):21-29, December 1999.
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 10
  • 11
    • 33745867657 scopus 로고    scopus 로고
    • Design and implementation of a support tool for attack trees
    • Alexander Opel, Otto-von-Guericke University, March. Internship Thesis
    • Alexander Opel. Design and implementation of a support tool for attack trees. Technical report, Otto-von-Guericke University, March 2005. Internship Thesis.
    • (2005) Technical Report
  • 12
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives and strategies
    • Peng Liu, Wanyu Zang, and Meng Yu. Incentive-Based Modeling and Inference of Attacker Intent, Objectives and Strategies. ACM Transactions on Information and Systems Security, 8(1):78-118, 2005.
    • (2005) ACM Transactions on Information and Systems Security , vol.8 , Issue.1 , pp. 78-118
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 14
    • 84885717978 scopus 로고    scopus 로고
    • 2004 E-Crime Watch Survey. Conducted by CSO magazine in cooperation with the U.S. Secret Service & CERT Coordination Center
    • -2004 E-Crime Watch Survey. Summary of Findings. Conducted by CSO magazine in cooperation with the U.S. Secret Service & CERT Coordination Center. Available at http://www.cert.org/archive/pdf/2004eCrimeWatchSummary.pdf, 2004.
    • (2004) Summary of Findings.
  • 15
    • 84860846663 scopus 로고    scopus 로고
    • The role of attack simulation in automating security risk management
    • Gidi Cohen. The role of attack simulation in automating security risk management. Information Systems Control Journal, 1:51-54, 2005.
    • (2005) Information Systems Control Journal , vol.1 , pp. 51-54
    • Cohen, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.