-
1
-
-
84869393312
-
The research value of publishing attacks
-
Basin, D.A., Capkun, S.: The research value of publishing attacks. Commun. ACM 55(11), 22-24 (2012)
-
(2012)
Commun. ACM
, vol.55
, Issue.11
, pp. 22-24
-
-
Basin, D.A.1
Capkun, S.2
-
2
-
-
84900563612
-
Quantitative Security Analysis (Dagstuhl Seminar 12481)
-
Köpf, B., Malacaria, P., Palamidessi, C.: Quantitative Security Analysis (Dagstuhl Seminar 12481). Dagstuhl Reports 2(11), 135-154 (2013)
-
(2013)
Dagstuhl Reports
, vol.2
, Issue.11
, pp. 135-154
-
-
Köpf, B.1
Malacaria, P.2
Palamidessi, C.3
-
3
-
-
0002670359
-
Attack trees: Modeling security threats
-
December
-
Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb's Journal 24(12) (December 1999)
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
-
-
Schneier, B.1
-
4
-
-
85099427023
-
Computing exact outcomes of multi-parameter attack trees
-
Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. Springer, Heidelberg
-
Jürgenson, A., Willemson, J.: Computing exact outcomes of multi-parameter attack trees. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1036-1051. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5332
, pp. 1036-1051
-
-
Jürgenson, A.1
Willemson, J.2
-
5
-
-
84857098557
-
Computational aspects of attack-defense trees
-
Bouvry, P., Kłopotek, M.A., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybiński, H. (eds.) SIIS 2011. Springer, Heidelberg
-
Kordy, B., Pouly, M., Schweitzer, P.: Computational aspects of attack-defense trees. In: Bouvry, P., Kłopotek, M.A., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybiński, H. (eds.) SIIS 2011. LNCS, vol. 7053, pp. 103-116. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7053
, pp. 103-116
-
-
Kordy, B.1
Pouly, M.2
Schweitzer, P.3
-
6
-
-
84864293887
-
Attack countermeasure trees (act): Towards unifying the constructs of attack and defense trees
-
Roy, A., Kim, D., Trivedi, K.: Attack countermeasure trees (act): towards unifying the constructs of attack and defense trees. Sec. and Commun. Netw. 5(8), 929-943 (2012)
-
(2012)
Sec. And Commun. Netw.
, vol.5
, Issue.8
, pp. 929-943
-
-
Roy, A.1
Kim, D.2
Trivedi, K.3
-
7
-
-
70450092394
-
Rre: A game-theoretic intrusion response and recovery engine
-
July
-
Zonouz, S., Khurana, H., Sanders, W., Yardley, T.: Rre: A game-theoretic intrusion response and recovery engine. In: IEEE/IFIP International Conference on Dependable Systems Networks, DSN 2009, pp. 439-448 (July 2009)
-
(2009)
IEEE/IFIP International Conference on Dependable Systems Networks, DSN 2009
, pp. 439-448
-
-
Zonouz, S.1
Khurana, H.2
Sanders, W.3
Yardley, T.4
-
8
-
-
33646031830
-
Using attack trees to identify malicious attacks from authorized insiders
-
de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
-
Ray, I., Poolsapassit, N.: Using attack trees to identify malicious attacks from authorized insiders. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 231-246. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 231-246
-
-
Ray, I.1
Poolsapassit, N.2
-
9
-
-
84898077292
-
PhFit: A general phase-type fitting tool
-
Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. Springer, Heidelberg
-
Horváth, A., Telek, M.: PhFit: A general phase-type fitting tool. In: Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. LNCS, vol. 2324, pp. 82-91. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2324
, pp. 82-91
-
-
Horváth, A.1
Telek, M.2
-
10
-
-
33748117946
-
A novel approach for phase-type fitting with the EM algorithm
-
Thümmler, A., Buchholz, P., Telek, M.: A novel approach for phase-type fitting with the EM algorithm. IEEE Trans. Dependable Sec. Comput. 3(3), 245-258 (2006)
-
(2006)
IEEE Trans. Dependable Sec. Comput.
, vol.3
, Issue.3
, pp. 245-258
-
-
Thümmler, A.1
Buchholz, P.2
Telek, M.3
-
14
-
-
33745849657
-
Foundations of attack trees
-
Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
-
Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186-198. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
15
-
-
39149136534
-
Analyzing security scenarios using defence trees and answer set programming
-
Bistarelli, S., Peretti, P., Trubitsyna, I.: Analyzing security scenarios using defence trees and answer set programming. Electron. Notes Theor. Comput. Sci. 197(2), 121-129 (2008)
-
(2008)
Electron. Notes Theor. Comput. Sci.
, vol.197
, Issue.2
, pp. 121-129
-
-
Bistarelli, S.1
Peretti, P.2
Trubitsyna, I.3
-
16
-
-
79952577498
-
Foundations of attack-defense trees
-
Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. Springer, Heidelberg
-
Kordy, B., Mauw, S., Radomirović, S., Schweitzer, P.: Foundations of attack-defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80-95. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6561
, pp. 80-95
-
-
Kordy, B.1
Mauw, S.2
Radomirović, S.3
Schweitzer, P.4
-
17
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 273-284 (2002)
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
18
-
-
33749639831
-
Quantitative cyber risk reduction estimation methodology for a small SCADA control system
-
McQueen, M., Boyer, W., Flynn, M., Beitel, G.: Quantitative cyber risk reduction estimation methodology for a small SCADA control system. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS 2006, vol. 9, pp. 226 (2006)
-
(2006)
Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS 2006
, vol.9
, pp. 226
-
-
McQueen, M.1
Boyer, W.2
Flynn, M.3
Beitel, G.4
-
19
-
-
80055043688
-
Model-based security metrics using adversary view security evaluation (advise)
-
IEEE Computer Society
-
LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using adversary view security evaluation (advise). In: Proceedings of the 2011 Eighth International Conference on Quantitative Evaluation of SysTems, QEST 2011, pp. 191-200. IEEE Computer Society (2011)
-
(2011)
Proceedings of the 2011 Eighth International Conference on Quantitative Evaluation of SysTems, QEST 2011
, pp. 191-200
-
-
LeMay, E.1
Ford, M.D.2
Keefe, K.3
Sanders, W.H.4
Muehrcke, C.5
-
21
-
-
77954331938
-
Beyond attack trees: Dynamic security modeling with boolean logic driven Markov processes (BDMP)
-
April
-
Piètre-Cambacédès, L., Bouissou, M.: Beyond attack trees: Dynamic security modeling with boolean logic driven Markov processes (BDMP). In: European Dependable Computing Conference (EDCC), pp. 199-208 (April 2010)
-
(2010)
European Dependable Computing Conference (EDCC)
, pp. 199-208
-
-
Piètre-Cambacédès, L.1
Bouissou, M.2
-
22
-
-
78649281480
-
Attack and defense modeling with BDMP
-
Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. Springer, Heidelberg
-
Piètre-Cambacédès, L., Bouissou, M.: Attack and defense modeling with BDMP. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 86-101. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6258
, pp. 86-101
-
-
Piètre-Cambacédès, L.1
Bouissou, M.2
-
24
-
-
0030502888
-
Fitting phase-type distributions via the EM algorithm
-
Asmussen, S., Nerman, O., Olsson, M.: Fitting phase-type distributions via the EM algorithm. Scandinavian Journal of Statistics 23(4), 419-441 (1996)
-
(1996)
Scandinavian Journal of Statistics
, vol.23
, Issue.4
, pp. 419-441
-
-
Asmussen, S.1
Nerman, O.2
Olsson, M.3
-
26
-
-
33646443365
-
Spectral polynomial algorithms for computing bi-diagonal representations for phase type distributions and matrix-exponential distributions
-
He, Q.M., Zhang, H.: Spectral polynomial algorithms for computing bi-diagonal representations for phase type distributions and matrix-exponential distributions. Stochastic Models 2(2), 289-317 (2006)
-
(2006)
Stochastic Models
, vol.2
, Issue.2
, pp. 289-317
-
-
He, Q.M.1
Zhang, H.2
-
27
-
-
84971173381
-
A use of complex probabilities in the theory of stochastic processes
-
Cox, D.R.: A use of complex probabilities in the theory of stochastic processes. Proceedings of the Cambridge Philosophical Society 51(2), 313-319 (1955)
-
(1955)
Proceedings of the Cambridge Philosophical Society
, vol.51
, Issue.2
, pp. 313-319
-
-
Cox, D.R.1
-
28
-
-
0020419336
-
Canonical representation of homogeneous Markov processes modelling failure time distributions
-
Cumani, A.: Canonical representation of homogeneous Markov processes modelling failure time distributions. Microelectronics and Reliability 2(3), 583-602 (1982)
-
(1982)
Microelectronics and Reliability
, vol.2
, Issue.3
, pp. 583-602
-
-
Cumani, A.1
-
29
-
-
74049090498
-
Acyclic minimality by construction-almost
-
IEEE Computer Society
-
Pulungan, R., Hermanns, H.: Acyclic minimality by construction-almost. In: QEST, pp. 63-72. IEEE Computer Society (2009)
-
(2009)
QEST
, pp. 63-72
-
-
Pulungan, R.1
Hermanns, H.2
-
30
-
-
21344479789
-
Exact and ordinary lumpability in finite Markov chains
-
Buchholz, P.: Exact and ordinary lumpability in finite Markov chains. Journal of Applied Probability 31, 59-75 (1994)
-
(1994)
Journal of Applied Probability
, vol.31
, pp. 59-75
-
-
Buchholz, P.1
-
31
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 23(4), 235-245 (1997)
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
32
-
-
0023825824
-
Numerical transient analysis of Markov models
-
Reibman, A.L., Trivedi, K.S.: Numerical transient analysis of Markov models. Computers & OR 15(1), 19-36 (1988)
-
(1988)
Computers & OR
, vol.15
, Issue.1
, pp. 19-36
-
-
Reibman, A.L.1
Trivedi, K.S.2
-
33
-
-
0023999020
-
Computing poisson probabilities
-
Fox, B.L., Glynn, P.W.: Computing poisson probabilities. Commun. ACM 31(4), 440-445 (1988)
-
(1988)
Commun. ACM
, vol.31
, Issue.4
, pp. 440-445
-
-
Fox, B.L.1
Glynn, P.W.2
-
34
-
-
84896694223
-
Probabilistic symbolic model checking with prism: A hybrid approach
-
Kwiatkowska, M.Z., Norman, G., Parker, D.: Probabilistic symbolic model checking with prism: a hybrid approach. STTT 6(2), 128-142 (2004)
-
(2004)
STTT
, vol.6
, Issue.2
, pp. 128-142
-
-
Kwiatkowska, M.Z.1
Norman, G.2
Parker, D.3
-
35
-
-
78751571321
-
The ins and outs of the probabilistic model checker mrmc
-
Katoen, J.P., Zapreev, I.S., Hahn, E.M., Hermanns, H., Jansen, D.N.: The ins and outs of the probabilistic model checker mrmc. Perform. Eval. 68(2), 90-104 (2011)
-
(2011)
Perform. Eval.
, vol.68
, Issue.2
, pp. 90-104
-
-
Katoen, J.P.1
Zapreev, I.S.2
Hahn, E.M.3
Hermanns, H.4
Jansen, D.N.5
-
36
-
-
84872068584
-
Modeling the stuxnet attack with BDMP: Towards more formal risk assessments
-
October
-
Kriaa, S., Bouissou, M., Piètre-Cambacédès, L.: Modeling the stuxnet attack with BDMP: Towards more formal risk assessments. In: 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pp. 1-8 (October 2012)
-
(2012)
7th International Conference on Risk and Security of Internet and Systems (CRiSIS)
, pp. 1-8
-
-
Kriaa, S.1
Bouissou, M.2
Piètre-Cambacédès, L.3
-
37
-
-
84900529862
-
-
The TREsPASS project: http://www.trespass-project.eu
-
-
-
|