메뉴 건너뛰기




Volumn , Issue , 2012, Pages 284-301

Attack graphs and scenario driven wireless computer network defense

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898110549     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-0104-8.ch016     Document Type: Chapter
Times cited : (5)

References (34)
  • 1
    • 13444301344 scopus 로고    scopus 로고
    • Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs
    • doi:10.1109/TVT.2004.838829
    • Alrabady, A., & Mahmud, S. (2005). Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Transactions on Vehicular Technology, 54(1), 41-50. doi:10.1109/TVT.2004.838829
    • (2005) IEEE Transactions On Vehicular Technology , vol.54 , Issue.1 , pp. 41-50
    • Alrabady, A.1    Mahmud, S.2
  • 3
    • 35148826283 scopus 로고    scopus 로고
    • Unpublished M.S. thesis, Massachusetts Institute of Technology, Cambridge, MA
    • Artz, M. L. (2002). NetSPA: A network security planning architecture. Unpublished M.S. thesis, Massachusetts Institute of Technology, Cambridge, MA.
    • (2002) NetSPA: A Network Security Planning Architecture
    • Artz, M.L.1
  • 4
    • 79251634421 scopus 로고    scopus 로고
    • Worm was perfect for sabotaging centrifuges
    • November 18, Retrieved Nov. 19, 2010, from
    • Broad, W. J., & Sanger, D. E. (November 18, 2010). Worm was perfect for sabotaging centrifuges. New York Times. Retrieved Nov. 19, 2010, from http://www.nytimes.com/2010/11/19/world/middleeast/19stuxnet.html?_r=1
    • (2010) New York Times
    • Broad, W.J.1    Sanger, D.E.2
  • 5
    • 84904319424 scopus 로고    scopus 로고
    • On modeling computer networks for vulnerability analysis
    • In Gudes, E., & Shenoi, S. (Eds.), Boston, MA: Kluwer Academic Publishers
    • Campbell, C., Dawkins, J., Pollet, B., Fitch, K., Hale, J., & Papa, M. (2003). On modeling computer networks for vulnerability analysis. In Gudes, E., & Shenoi, S. (Eds.), Research directions in data and applications security (pp. 233-244). Boston, MA: Kluwer Academic Publishers.
    • (2003) Research Directions In Data and Applications Security , pp. 233-244
    • Campbell, C.1    Dawkins, J.2    Pollet, B.3    Fitch, K.4    Hale, J.5    Papa, M.6
  • 12
    • 84898081823 scopus 로고    scopus 로고
    • Analysis methods for sensor networks
    • In Misra, S., Woungang, I., & Misra, S. C. (Eds.), New York, NY: Springer. doi:10.1007/978-1-84882-218-4_25
    • Hawrylak, P. J., Cain, J. T., & Mickle, M. H. (2009). Analysis methods for sensor networks. In Misra, S., Woungang, I., & Misra, S. C. (Eds.), Guide to wireless sensor networks (pp. 635-658). New York, NY: Springer. doi:10.1007/978-1-84882-218-4_25
    • (2009) Guide to Wireless Sensor Networks , pp. 635-658
    • Hawrylak, P.J.1    Cain, J.T.2    Mickle, M.H.3
  • 19
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • Jajodia, S., Noel, S., & OBerry, B. (2005). Topological analysis of network attack vulnerability. Managing Cyber Threats, (pp. 247-266).
    • (2005) Managing Cyber Threats , pp. 247-266
    • Jajodia, S.1    Noel, S.2    Oberry, B.3
  • 23
    • 84898186975 scopus 로고    scopus 로고
    • Newton-Evans Research Company
    • Newton-Evans Research Company. (2008). Substation automation report.
    • (2008) Substation Automation Report
  • 26
    • 59649125973 scopus 로고    scopus 로고
    • Effects of denial-of-sleep attacks on wireless sensor network MAC protocols
    • January, doi:10.1109/TVT.2008.921621
    • Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2009, January). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367-380. doi:10.1109/TVT.2008.921621
    • (2009) IEEE Transactions On Vehicular Technology , vol.58 , Issue.1 , pp. 367-380
    • Raymond, D.R.1    Marchany, R.C.2    Brownfield, M.I.3    Midkiff, S.F.4
  • 28
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December, December
    • Schneier, B. (1999, December). Attack trees: Modeling security threats. Dr. Dobb's Journal, December, 21-29.
    • (1999) Dr. Dobb's Journal , pp. 21-29
    • Schneier, B.1
  • 32
    • 77953212834 scopus 로고    scopus 로고
    • Applying RFID technology in nuclear materials management packaging, transport
    • doi:10.1179/174651008X279000
    • Tsai, H. C., Chen, K., Liu, Y., Norair, J. P., Bellamy, S., & Shuler, J. (2008). Applying RFID technology in nuclear materials management Packaging, Transport. Storage and Security of Radioactive Material, 19(1), 41-46. doi:10.1179/174651008X279000
    • (2008) Storage and Security of Radioactive Material , vol.19 , Issue.1 , pp. 41-46
    • Tsai, H.C.1    Chen, K.2    Liu, Y.3    Norair, J.P.4    Bellamy, S.5    Shuler, J.6
  • 33
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • doi:10.1016/j.comcom.2006.06.018
    • Wang, L., Noel, S., & Jajodia, S. (2006). Minimum-cost network hardening using attack graphs. Computer Communications, 29(18), 3812-3824. doi:10.1016/j.comcom.2006.06.018
    • (2006) Computer Communications , vol.29 , Issue.18 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3
  • 34
    • 58349103127 scopus 로고    scopus 로고
    • Two stochastic models for security evaluation based on attack graph
    • November, Washington, DC: IEEE Computer Society
    • Zhang, Y., Fan, X., Xue, Z., & Xu, H. (2008, November). Two stochastic models for security evaluation based on attack graph. In The 9th International Conference for Young Computer Scientists, (pp. 2198-2203). Washington, DC: IEEE Computer Society.
    • (2008) The 9th International Conference For Young Computer Scientists , pp. 2198-2203
    • Zhang, Y.1    Fan, X.2    Xue, Z.3    Xu, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.