-
2
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Washington, DC, November
-
P. Ammann, D. Wijesekera and S. Kaushik, Scalable, graph-based network vulnerability analysis, in: Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002.
-
(2002)
Proceedings of 9th ACM Conference on Computer and Communications Security
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
5
-
-
33747205462
-
On the brittleness of software and the infeasibility of security metrics
-
S. Bellovin, On the brittleness of software and the infeasibility of security metrics, IEEE Security & Privacy 4(4) (2006), 96 pp.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 96
-
-
Bellovin, S.1
-
6
-
-
0012945946
-
Models and tools for quantitative assessment of operational security
-
M. Dacier, Y. Deswarte and M. Kaâniche, Models and tools for quantitative assessment of operational security, in: IFIP SEC, 1996.
-
(1996)
IFIP SEC
-
-
Dacier, M.1
Deswarte, Y.2
Kaâniche, M.3
-
11
-
-
3042720722
-
Information security: Why the future belongs to the quants
-
D. Geer Jr., K. Soo Hoo and A. Jaquith, Information security: Why the future belongs to the quants, IEEE Security & Privacy 1(4) (2003), 24-32.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 24-32
-
-
Geer Jr., D.1
Soo Hoo, K.2
Jaquith, A.3
-
13
-
-
81455142740
-
Extending attack graph-based security metrics and aggregating their application
-
N. Idika and B. Bhargava, Extending attack graph-based security metrics and aggregating their application, IEEE Transactions on Dependable and Secure Computing 9(1) (2012), 75-85.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.1
, pp. 75-85
-
-
Idika, N.1
Bhargava, B.2
-
14
-
-
77950793246
-
Modeling modern network attacks and countermeasures using attack graphs
-
K. Ingols, M. Chu, R. Lippmann, S. Webster and S. Boyer, Modeling modern network attacks and countermeasures using attack graphs, in: 25th Annual Computer Security Applications Conference (ACSAC), 2009.
-
(2009)
25th Annual Computer Security Applications Conference (ACSAC
-
-
Ingols, K.1
Chu, M.2
Lippmann, R.3
Webster, S.4
Boyer, S.5
-
15
-
-
39049104457
-
Practical attack graph generation for network defense
-
Miami Beach, FL December
-
K. Ingols, R. Lippmann and K. Piwowarski, Practical attack graph generation for network defense, in: 22nd Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, December 2006.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC)
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
17
-
-
84890086071
-
-
V. Kumar, J. Srivastava and A. Lazarevic, eds Kluwer Academic Publisher Chapter 5
-
S. Jajodia, S. Noel and B. O'Berry, Topological analysis of network attack vulnerability, in: Managing Cyber Threats: Issues, Approaches and Challanges, V. Kumar, J. Srivastava and A. Lazarevic, eds, Kluwer Academic Publisher, 2003, Chapter 5.
-
(2003)
Topological Analysis of Network Attack Vulnerability, In: Managing Cyber Threats: Issues, Approaches and Challanges
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
19
-
-
33750734683
-
An approach to model network exploitations using exploitation graphs
-
W. Li, R.B. Vaughn and Y.S. Dandass, An approach to model network exploitations using exploitation graphs, Simulation 82(8) (2006), 523-541.
-
(2006)
Simulation
, vol.82
, Issue.8
, pp. 523-541
-
-
Li, W.1
Vaughn, R.B.2
Dandass, Y.S.3
-
21
-
-
35148893877
-
Evaluating and strengthening enterprise network security using attack graphs
-
October
-
R.P. Lippmann, K.W. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz and R. Cunningham, Evaluating and strengthening enterprise network security using attack graphs, Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, October 2005.
-
(2005)
Technical Report ESC-TR-2005-2064, MIT Lincoln Laboratory
-
-
Lippmann, R.P.1
Ingols, K.W.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.7
-
24
-
-
34547526394
-
Quality of protection: Measuring the unmeasurable?
-
(QoP), Alexandria, VA, USA
-
J. McHugh, Quality of protection: Measuring the unmeasurable?, in: Proceedings of the 2nd ACM Workshop on Quality of Protection (QoP), Alexandria, VA, USA, 2006.
-
(2006)
Proceedings of the 2nd ACM Workshop on Quality of Protection
-
-
McHugh, J.1
-
26
-
-
38149024063
-
Ranking attack graphs
-
September
-
V. Mehta, C. Bartzis, H. Zhu, E. Clarke and J. Wing, Ranking attack graphs, in: Proceedings of Recent Advances in Intrusion Detection (RAID), September 2006.
-
(2006)
Proceedings of Recent Advances in Intrusion Detection (RAID
-
-
Mehta, V.1
Bartzis, C.2
Zhu, H.3
Clarke, E.4
Wing, J.5
-
28
-
-
79959930622
-
Measuring security risk of networks using attack graphs
-
S. Noel, S. Jajodia, L. Wang and A. Singhal, Measuring security risk of networks using attack graphs, International Journal of Next - Generation Computing 1(1) (2010), 135-147.
-
(2010)
International Journal of Next - Generation Computing
, vol.1
, Issue.1
, pp. 135-147
-
-
Noel, S.1
Jajodia, S.2
Wang, L.3
Singhal, A.4
-
29
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
R. Ortalo, Y. Deswarte and M. Kaâniche, Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Transactions on Software Engineering 25(5) (1999), 633-650.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
30
-
-
38049113070
-
A logic-programming approach to network security analysis
-
X. Ou, A logic-programming approach to network security analysis, PhD thesis, Princeton University, 2005.
-
(2005)
PhD Thesis Princeton University
-
-
Ou, X.1
-
34
-
-
0003798347
-
Probabilistic reasoning in intelligent systems: Networks of plausible inference
-
J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufman, 1988.
-
(1988)
Morgan Kaufman
-
-
Pearl, J.1
-
36
-
-
77957996560
-
The technical specification for the security content automation protocol (scap): Scap version 1.0
-
S. Quinn, D. Waltermire, C. Johnson, K. Scarfone and J. Banghart, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0, The National Institute of Standards and Technology Special Publication 800-126, 2009.
-
(2009)
The National Institute of Standards and Technology Special Publication
, pp. 800-126
-
-
Quinn, S.1
Waltermire, D.2
Johnson, C.3
Scarfone, K.4
Banghart, J.5
-
41
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann and J.M. Wing, Automated generation and analysis of attack graphs, in: Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002, pp. 254-265.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 254-265
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
42
-
-
84964504906
-
Computer-Attack graph generation tool
-
June
-
L.P. Swiler, C. Phillips, D. Ellis and S. Chakerian, Computer-Attack graph generation tool, in: DARPA Information Survivability Conference and Exposition (DISCEX II'01), Vol. 2, June 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II'01
, vol.2
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
43
-
-
0001790593
-
Depth-first search and linear graph algorithms
-
R. Tarjan, Depth-first search and linear graph algorithms, SIAM Journal on Computing 1(2) (1972), 146-160.
-
(1972)
SIAM Journal on Computing
, vol.1
, Issue.2
, pp. 146-160
-
-
Tarjan, R.1
-
44
-
-
2642540118
-
Modeling internet attacks
-
West Point, NY, June
-
T. Tidwell, R. Larson, K. Fitch and J. Hale, Modeling internet attacks, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY, June 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Tidwell, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
-
45
-
-
77950904346
-
An attack graph-based probabilistic security metric
-
L. Wang, T. Islam, T. Long, A. Singhal and S. Jajodia, An attack graph-based probabilistic security metric, in: Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'08), 2008.
-
(2008)
Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'08
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
46
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
L. Wang, S. Noel and S. Jajodia, Minimum-cost network hardening using attack graphs, Computer Communications 29 (2006), 3812-3824.
-
(2006)
Computer Communications
, vol.29
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
|