메뉴 건너뛰기




Volumn 8414 LNCS, Issue , 2014, Pages 285-305

Time-dependent analysis of attacks

Author keywords

[No Author keywords available]

Indexed keywords

FORESTRY;

EID: 84900528864     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-54792-8_16     Document Type: Conference Paper
Times cited : (76)

References (37)
  • 1
    • 84869393312 scopus 로고    scopus 로고
    • The research value of publishing attacks
    • Basin, D.A., Capkun, S.: The research value of publishing attacks. Commun. ACM 55(11), 22-24 (2012)
    • (2012) Commun. ACM , vol.55 , Issue.11 , pp. 22-24
    • Basin, D.A.1    Capkun, S.2
  • 2
    • 84900563612 scopus 로고    scopus 로고
    • Quantitative Security Analysis (Dagstuhl Seminar 12481)
    • Köpf, B., Malacaria, P., Palamidessi, C.: Quantitative Security Analysis (Dagstuhl Seminar 12481). Dagstuhl Reports 2(11), 135-154 (2013)
    • (2013) Dagstuhl Reports , vol.2 , Issue.11 , pp. 135-154
    • Köpf, B.1    Malacaria, P.2    Palamidessi, C.3
  • 3
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • December
    • Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb's Journal 24(12) (December 1999)
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12
    • Schneier, B.1
  • 4
    • 85099427023 scopus 로고    scopus 로고
    • Computing exact outcomes of multi-parameter attack trees
    • Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. Springer, Heidelberg
    • Jürgenson, A., Willemson, J.: Computing exact outcomes of multi-parameter attack trees. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1036-1051. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5332 , pp. 1036-1051
    • Jürgenson, A.1    Willemson, J.2
  • 5
    • 84857098557 scopus 로고    scopus 로고
    • Computational aspects of attack-defense trees
    • Bouvry, P., Kłopotek, M.A., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybiński, H. (eds.) SIIS 2011. Springer, Heidelberg
    • Kordy, B., Pouly, M., Schweitzer, P.: Computational aspects of attack-defense trees. In: Bouvry, P., Kłopotek, M.A., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybiński, H. (eds.) SIIS 2011. LNCS, vol. 7053, pp. 103-116. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7053 , pp. 103-116
    • Kordy, B.1    Pouly, M.2    Schweitzer, P.3
  • 6
    • 84864293887 scopus 로고    scopus 로고
    • Attack countermeasure trees (act): Towards unifying the constructs of attack and defense trees
    • Roy, A., Kim, D., Trivedi, K.: Attack countermeasure trees (act): towards unifying the constructs of attack and defense trees. Sec. and Commun. Netw. 5(8), 929-943 (2012)
    • (2012) Sec. And Commun. Netw. , vol.5 , Issue.8 , pp. 929-943
    • Roy, A.1    Kim, D.2    Trivedi, K.3
  • 8
    • 33646031830 scopus 로고    scopus 로고
    • Using attack trees to identify malicious attacks from authorized insiders
    • de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
    • Ray, I., Poolsapassit, N.: Using attack trees to identify malicious attacks from authorized insiders. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 231-246. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3679 , pp. 231-246
    • Ray, I.1    Poolsapassit, N.2
  • 9
    • 84898077292 scopus 로고    scopus 로고
    • PhFit: A general phase-type fitting tool
    • Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. Springer, Heidelberg
    • Horváth, A., Telek, M.: PhFit: A general phase-type fitting tool. In: Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. LNCS, vol. 2324, pp. 82-91. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2324 , pp. 82-91
    • Horváth, A.1    Telek, M.2
  • 14
    • 33745849657 scopus 로고    scopus 로고
    • Foundations of attack trees
    • Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
    • Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3935 , pp. 186-198
    • Mauw, S.1    Oostdijk, M.2
  • 15
    • 39149136534 scopus 로고    scopus 로고
    • Analyzing security scenarios using defence trees and answer set programming
    • Bistarelli, S., Peretti, P., Trubitsyna, I.: Analyzing security scenarios using defence trees and answer set programming. Electron. Notes Theor. Comput. Sci. 197(2), 121-129 (2008)
    • (2008) Electron. Notes Theor. Comput. Sci. , vol.197 , Issue.2 , pp. 121-129
    • Bistarelli, S.1    Peretti, P.2    Trubitsyna, I.3
  • 16
    • 79952577498 scopus 로고    scopus 로고
    • Foundations of attack-defense trees
    • Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. Springer, Heidelberg
    • Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of attack-defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80-95. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6561 , pp. 80-95
    • Kordy, B.1    Mauw, S.2    Radomirović, S.3    Schweitzer, P.4
  • 21
    • 77954331938 scopus 로고    scopus 로고
    • Beyond attack trees: Dynamic security modeling with boolean logic driven Markov processes (BDMP)
    • April
    • Piètre-Cambacédès, L., Bouissou, M.: Beyond attack trees: Dynamic security modeling with boolean logic driven Markov processes (BDMP). In: European Dependable Computing Conference (EDCC), pp. 199-208 (April 2010)
    • (2010) European Dependable Computing Conference (EDCC) , pp. 199-208
    • Piètre-Cambacédès, L.1    Bouissou, M.2
  • 22
    • 78649281480 scopus 로고    scopus 로고
    • Attack and defense modeling with BDMP
    • Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. Springer, Heidelberg
    • Piètre-Cambacédès, L., Bouissou, M.: Attack and defense modeling with BDMP. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 86-101. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6258 , pp. 86-101
    • Piètre-Cambacédès, L.1    Bouissou, M.2
  • 23
  • 26
    • 33646443365 scopus 로고    scopus 로고
    • Spectral polynomial algorithms for computing bi-diagonal representations for phase type distributions and matrix-exponential distributions
    • He, Q.M., Zhang, H.: Spectral polynomial algorithms for computing bi-diagonal representations for phase type distributions and matrix-exponential distributions. Stochastic Models 2(2), 289-317 (2006)
    • (2006) Stochastic Models , vol.2 , Issue.2 , pp. 289-317
    • He, Q.M.1    Zhang, H.2
  • 27
    • 84971173381 scopus 로고
    • A use of complex probabilities in the theory of stochastic processes
    • Cox, D.R.: A use of complex probabilities in the theory of stochastic processes. Proceedings of the Cambridge Philosophical Society 51(2), 313-319 (1955)
    • (1955) Proceedings of the Cambridge Philosophical Society , vol.51 , Issue.2 , pp. 313-319
    • Cox, D.R.1
  • 28
    • 0020419336 scopus 로고
    • Canonical representation of homogeneous Markov processes modelling failure time distributions
    • Cumani, A.: Canonical representation of homogeneous Markov processes modelling failure time distributions. Microelectronics and Reliability 2(3), 583-602 (1982)
    • (1982) Microelectronics and Reliability , vol.2 , Issue.3 , pp. 583-602
    • Cumani, A.1
  • 29
    • 74049090498 scopus 로고    scopus 로고
    • Acyclic minimality by construction-almost
    • IEEE Computer Society
    • Pulungan, R., Hermanns, H.: Acyclic minimality by construction-almost. In: QEST, pp. 63-72. IEEE Computer Society (2009)
    • (2009) QEST , pp. 63-72
    • Pulungan, R.1    Hermanns, H.2
  • 30
    • 21344479789 scopus 로고
    • Exact and ordinary lumpability in finite Markov chains
    • Buchholz, P.: Exact and ordinary lumpability in finite Markov chains. Journal of Applied Probability 31, 59-75 (1994)
    • (1994) Journal of Applied Probability , vol.31 , pp. 59-75
    • Buchholz, P.1
  • 31
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 23(4), 235-245 (1997)
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 32
    • 0023825824 scopus 로고
    • Numerical transient analysis of Markov models
    • Reibman, A.L., Trivedi, K.S.: Numerical transient analysis of Markov models. Computers & OR 15(1), 19-36 (1988)
    • (1988) Computers & OR , vol.15 , Issue.1 , pp. 19-36
    • Reibman, A.L.1    Trivedi, K.S.2
  • 33
    • 0023999020 scopus 로고
    • Computing poisson probabilities
    • Fox, B.L., Glynn, P.W.: Computing poisson probabilities. Commun. ACM 31(4), 440-445 (1988)
    • (1988) Commun. ACM , vol.31 , Issue.4 , pp. 440-445
    • Fox, B.L.1    Glynn, P.W.2
  • 34
    • 84896694223 scopus 로고    scopus 로고
    • Probabilistic symbolic model checking with prism: A hybrid approach
    • Kwiatkowska, M.Z., Norman, G., Parker, D.: Probabilistic symbolic model checking with prism: a hybrid approach. STTT 6(2), 128-142 (2004)
    • (2004) STTT , vol.6 , Issue.2 , pp. 128-142
    • Kwiatkowska, M.Z.1    Norman, G.2    Parker, D.3
  • 37
    • 84900529862 scopus 로고    scopus 로고
    • The TREsPASS project: http://www.trespass-project.eu


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.