-
1
-
-
13444301344
-
Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs
-
doi:10.1109/TVT.2004.838829
-
Alrabady, A., & Mahmud, S. (2005). Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Transactions on Vehicular Technology, 54(1), 41-50. doi:10.1109/TVT.2004.838829
-
(2005)
IEEE Transactions On Vehicular Technology
, vol.54
, Issue.1
, pp. 41-50
-
-
Alrabady, A.1
Mahmud, S.2
-
2
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Ammann, P., Wijesekera, D., & Kaushik, S. (2002). Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 217-224).
-
(2002)
Proceedings of the 9th ACM Conference On Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
3
-
-
35148826283
-
-
Unpublished M.S. thesis, Massachusetts Institute of Technology, Cambridge, MA
-
Artz, M. L. (2002). NetSPA: A network security planning architecture. Unpublished M.S. thesis, Massachusetts Institute of Technology, Cambridge, MA.
-
(2002)
NetSPA: A Network Security Planning Architecture
-
-
Artz, M.L.1
-
4
-
-
79251634421
-
Worm was perfect for sabotaging centrifuges
-
November 18, Retrieved Nov. 19, 2010, from
-
Broad, W. J., & Sanger, D. E. (November 18, 2010). Worm was perfect for sabotaging centrifuges. New York Times. Retrieved Nov. 19, 2010, from http://www.nytimes.com/2010/11/19/world/middleeast/19stuxnet.html?_r=1
-
(2010)
New York Times
-
-
Broad, W.J.1
Sanger, D.E.2
-
5
-
-
84904319424
-
On modeling computer networks for vulnerability analysis
-
In Gudes, E., & Shenoi, S. (Eds.), Boston, MA: Kluwer Academic Publishers
-
Campbell, C., Dawkins, J., Pollet, B., Fitch, K., Hale, J., & Papa, M. (2003). On modeling computer networks for vulnerability analysis. In Gudes, E., & Shenoi, S. (Eds.), Research directions in data and applications security (pp. 233-244). Boston, MA: Kluwer Academic Publishers.
-
(2003)
Research Directions In Data and Applications Security
, pp. 233-244
-
-
Campbell, C.1
Dawkins, J.2
Pollet, B.3
Fitch, K.4
Hale, J.5
Papa, M.6
-
6
-
-
77953219235
-
A radiofrequency identification (RFID) temperature-monitoring system for extended maintenance of nuclear materials packaging
-
July
-
Chen, K., Tsai, H. C., Fabian, B., Liu, Y., & Shuler, J. (2009 July). A radiofrequency identification (RFID) temperature-monitoring system for extended maintenance of nuclear materials packaging. Proceedings of the 2009 ASME Pressure Vessels and Piping Division Conference (pp. 109-115). ASME.
-
(2009)
Proceedings of the 2009 ASME Pressure Vessels and Piping Division Conference
, pp. 109-115
-
-
Chen, K.1
Tsai, H.C.2
Fabian, B.3
Liu, Y.4
Shuler, J.5
-
7
-
-
15944397932
-
Quantitative and qualitative analytical techniques for network security assessment
-
June, IEEE
-
Clark, K., Tyree, S., Dawkins, J., & Hale, J. (2004, June). Quantitative and qualitative analytical techniques for network security assessment. Proceedings of the 2004 IEEE Workshop on Information Assurance and Security (pp. 321-328). IEEE.
-
(2004)
Proceedings of the 2004 IEEE Workshop On Information Assurance and Security
, pp. 321-328
-
-
Clark, K.1
Tyree, S.2
Dawkins, J.3
Hale, J.4
-
8
-
-
48749106465
-
Guiding threat analysis with threat source models
-
June
-
Clark, K., Tyree, S., Lee, C., & Hale, J. (2007, June). Guiding threat analysis with threat source models. Proceedings of the 2007 IEEE Workshop on Information Assurance (pp. 262-269). IEEE.
-
(2007)
Proceedings of the 2007 IEEE Workshop On Information Assurance
, pp. 262-269
-
-
Clark, K.1
Tyree, S.2
Lee, C.3
Hale, J.4
-
9
-
-
80054793984
-
-
(Rapport technique). Cryptology ePrint Archive, Report 2010/332
-
Francillon, A., Danev, B., & Capkun, S. (2010). Relay attacks on passive keyless entry and start systems in modern cars (Rapport technique). Cryptology ePrint Archive, Report 2010/332.
-
(2010)
Relay Attacks On Passive Keyless Entry and Start Systems In Modern Cars
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
11
-
-
84877922123
-
Analytic modeling methodology for analysis of energy consumption for ISO 18000-7 RFID Networks
-
doi:10.1504/IJRFITA.2007.017748
-
Hawrylak, P. J., Cain, J. T., & Mickle, M. H. (2007). Analytic modeling methodology for analysis of energy consumption for ISO 18000-7 RFID Networks. International Journal of Radio Frequency Identification Technology and Applications, 1(4), 371-400. doi:10.1504/IJRFITA.2007.017748
-
(2007)
International Journal of Radio Frequency Identification Technology and Applications
, vol.1
, Issue.4
, pp. 371-400
-
-
Hawrylak, P.J.1
Cain, J.T.2
Mickle, M.H.3
-
12
-
-
84898081823
-
Analysis methods for sensor networks
-
In Misra, S., Woungang, I., & Misra, S. C. (Eds.), New York, NY: Springer. doi:10.1007/978-1-84882-218-4_25
-
Hawrylak, P. J., Cain, J. T., & Mickle, M. H. (2009). Analysis methods for sensor networks. In Misra, S., Woungang, I., & Misra, S. C. (Eds.), Guide to wireless sensor networks (pp. 635-658). New York, NY: Springer. doi:10.1007/978-1-84882-218-4_25
-
(2009)
Guide to Wireless Sensor Networks
, pp. 635-658
-
-
Hawrylak, P.J.1
Cain, J.T.2
Mickle, M.H.3
-
13
-
-
56449106688
-
Improving attack graph visualization through data reduction and attack grouping
-
ACM
-
Homer, J., Varikuti, A., Ou, X., & McQueen, M. A. (2008). Improving attack graph visualization through data reduction and attack grouping. Proceedings of the 5th International Workshop on Visualization for Computer Security (pp. 68-79). ACM.
-
(2008)
Proceedings of the 5th International Workshop On Visualization For Computer Security
, pp. 68-79
-
-
Homer, J.1
Varikuti, A.2
Ou, X.3
McQueen, M.A.4
-
17
-
-
77950793246
-
Modeling modern network at-tacks and countermeasures using attack graphs
-
Ingols, K., Chu, M., Lippmann, R., Webster, S., & Boyer, S. (2009). Modeling modern network at-tacks and countermeasures using attack graphs. In 2009 Annual Computer Security Applications Conference (pp. 117-126).
-
(2009)
In 2009 Annual Computer Security Applications Conference
, pp. 117-126
-
-
Ingols, K.1
Chu, M.2
Lippmann, R.3
Webster, S.4
Boyer, S.5
-
18
-
-
39049104457
-
Practical attack graph generation for network defense
-
December
-
Ingols, K., Lippmann, R., & Piwowarski, K. (2006, December). Practical attack graph generation for network defense. Proceedings of the 22nd Annual Computer Security Applications Conference (pp. 121-130). IEEE.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
19
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
Jajodia, S., Noel, S., & OBerry, B. (2005). Topological analysis of network attack vulnerability. Managing Cyber Threats, (pp. 247-266).
-
(2005)
Managing Cyber Threats
, pp. 247-266
-
-
Jajodia, S.1
Noel, S.2
Oberry, B.3
-
21
-
-
77955201139
-
-
May, Paper presented at the 2010 IEEE Symposium on Security and Privacy, Oakland, CA
-
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., & Checkoway, S., Savage, S. (2010, May). Experimental security analysis of a modern automobile. Paper presented at the 2010 IEEE Symposium on Security and Privacy, Oakland, CA.
-
(2010)
Experimental Security Analysis of a Modern Automobile
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
Savage, S.7
-
22
-
-
34047168454
-
-
Massachusetts Institute of Technology, Lincoln Laboratory
-
Lippmann, R., Ingols, K., & Lincoln Lab, M. I. T. (2005). An annotated review of past papers on attack graphs. Massachusetts Institute of Technology, Lincoln Laboratory.
-
(2005)
An Annotated Review of Past Papers On Attack Graphs
-
-
Lippmann, R.1
Ingols, K.2
Lincoln Lab, M.I.T.3
-
23
-
-
84898186975
-
-
Newton-Evans Research Company
-
Newton-Evans Research Company. (2008). Substation automation report.
-
(2008)
Substation Automation Report
-
-
-
26
-
-
59649125973
-
Effects of denial-of-sleep attacks on wireless sensor network MAC protocols
-
January, doi:10.1109/TVT.2008.921621
-
Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009, January). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367-380. doi:10.1109/TVT.2008.921621
-
(2009)
IEEE Transactions On Vehicular Technology
, vol.58
, Issue.1
, pp. 367-380
-
-
Raymond, D.R.1
Marchany, R.C.2
Brownfield, M.I.3
Midkiff, S.F.4
-
28
-
-
0002670359
-
Attack trees: Modeling security threats
-
December, December
-
Schneier, B. (1999, December). Attack trees: Modeling security threats. Dr. Dobb's Journal, December, 21-29.
-
(1999)
Dr. Dobb's Journal
, pp. 21-29
-
-
Schneier, B.1
-
29
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
IEEE Computer Society
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., & Wing, J. M. (2002). Automated generation and analysis of attack graphs. Proceedings of the 2002 IEEE Symposium on Security and Privacy (pp. 273-284). IEEE Computer Society.
-
(2002)
Proceedings of the 2002 IEEE Symposium On Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
31
-
-
2642540118
-
Modeling internet attacks
-
Tidwell, T., Larson, R., Fitch, K., & Hale, J. (2001). Modeling internet attacks. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security (vol. 59).
-
(2001)
Proceedings of the 2001 IEEE Workshop On Information Assurance and Security
, vol.59
-
-
Tidwell, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
-
32
-
-
77953212834
-
Applying RFID technology in nuclear materials management packaging, transport
-
doi:10.1179/174651008X279000
-
Tsai, H. C., Chen, K., Liu, Y., Norair, J. P., Bellamy, S., & Shuler, J. (2008). Applying RFID technology in nuclear materials management Packaging, Transport. Storage and Security of Radioactive Material, 19(1), 41-46. doi:10.1179/174651008X279000
-
(2008)
Storage and Security of Radioactive Material
, vol.19
, Issue.1
, pp. 41-46
-
-
Tsai, H.C.1
Chen, K.2
Liu, Y.3
Norair, J.P.4
Bellamy, S.5
Shuler, J.6
-
33
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
doi:10.1016/j.comcom.2006.06.018
-
Wang, L., Noel, S., & Jajodia, S. (2006). Minimum-cost network hardening using attack graphs. Computer Communications, 29(18), 3812-3824. doi:10.1016/j.comcom.2006.06.018
-
(2006)
Computer Communications
, vol.29
, Issue.18
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
-
34
-
-
58349103127
-
Two stochastic models for security evaluation based on attack graph
-
November, Washington, DC: IEEE Computer Society
-
Zhang, Y., Fan, X., Xue, Z., & Xu, H. (2008, November). Two stochastic models for security evaluation based on attack graph. In The 9th International Conference for Young Computer Scientists, (pp. 2198-2203). Washington, DC: IEEE Computer Society.
-
(2008)
The 9th International Conference For Young Computer Scientists
, pp. 2198-2203
-
-
Zhang, Y.1
Fan, X.2
Xue, Z.3
Xu, H.4
|