-
1
-
-
84958522726
-
Security assessment of computer networks based on attack graphs and security events
-
Springer-Verlag, April
-
I. Kotenko and E. Doynikova, “Security assessment of computer networks based on attack graphs and security events,” in Proc. of the 2nd IFIP TC5/8 International Conference (ICT-EurAsia’14), Bali, Indonesia, LNCS, vol. 8047. Springer-Verlag, April 2014, pp. 462-471.
-
(2014)
Proc. of the 2nd IFIP TC5/8 International Conference (ICT-EurAsia’14), Bali, Indonesia, LNCS
, vol.8047
, pp. 462-471
-
-
Kotenko, I.1
Doynikova, E.2
-
3
-
-
84892428685
-
The ontology of metrics for security evaluation and decision support in SIEM systems
-
Regensburg, Germany. IEEE, September
-
I. Kotenko, I. Saenko, O. Polubelova, and E. Doynikova, “The ontology of metrics for security evaluation and decision support in SIEM systems,” in Proc. of the 8th International Conference on Availability, Reliability and Security (ARES’13), Regensburg, Germany. IEEE, September 2013, pp. 638-645.
-
(2013)
Proc. of the 8th International Conference on Availability, Reliability and Security (ARES’13)
, pp. 638-645
-
-
Kotenko, I.1
Saenko, I.2
Polubelova, O.3
Doynikova, E.4
-
4
-
-
51349093483
-
A novel quantitative approach for measuring network security
-
Arizona, USA. IEEE, April
-
M. S. Ahmed, E. Al-Shaer, and L. Khan, “A novel quantitative approach for measuring network security,” in Proc. of The 27th IEEE Conference on Computer Communications (INFOCOM’08), Phoenix, Arizona, USA. IEEE, April 2008, pp. 1957-1965.
-
(2008)
Proc. of The 27th IEEE Conference on Computer Communications (INFOCOM’08), Phoenix, Arizona, USA
, pp. 1957-1965
-
-
Ahmed, M.S.1
Al-Shaer, E.2
Khan, L.3
-
5
-
-
84900822652
-
Accounting for value and uncertainty in security metrics
-
C. W. Axelrod, “Accounting for value and uncertainty in security metrics,” Information Systems Control Journal, vol. 6, pp. 1-6, 2008.
-
(2008)
Information Systems Control Journal
, vol.6
, pp. 1-6
-
-
Axelrod, C.W.1
-
7
-
-
77954868663
-
Network risk management using attacker profiling
-
R. Dantu, P. Kolan, and J. Cangussu, “Network risk management using attacker profiling,” Security and Communication Networks, vol. 2, no. 1, pp. 83-96, 2009.
-
(2009)
Security and Communication Networks
, vol.2
, Issue.1
, pp. 83-96
-
-
Dantu, R.1
Kolan, P.2
Cangussu, J.3
-
9
-
-
79956283111
-
-
The Center for Internet Security
-
“The CIS security metrics,” The Center for Internet Security, 2009.
-
(2009)
The CIS Security Metrics
-
-
-
12
-
-
12244283592
-
-
NIST Special Publication 800-55, Tech. Rep., July
-
M. Swanson, N. Bartol, J. Sabato, J. Hash, and L. Graffo, “Security metrics guide for information technology systems,” NIST Special Publication 800-55, Tech. Rep., July 2003.
-
(2003)
Security Metrics Guide for Information Technology Systems
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
13
-
-
33745435096
-
-
October
-
N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, I. Lambadaris, and A. Hatfield, “Current trends and advances in information assurance metrics,” pp. 197-205, October 2004.
-
(2004)
Current trends and advances in information assurance metrics
, pp. 197-205
-
-
Seddigh, N.1
Pieda, P.2
Matrawy, A.3
Nandy, B.4
Lambadaris, I.5
Hatfield, A.6
-
14
-
-
78049413993
-
-
September
-
N. Kheir, N. Cuppens-Boulahia, F. Cuppens, and H. Debar, “A service dependency model for cost-sensitive intrusion response,” pp. 626-642, September 2010.
-
(2010)
A service dependency model for cost-sensitive intrusion response
, pp. 626-642
-
-
Kheir, N.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Debar, H.4
-
15
-
-
63249136255
-
-
October
-
W. Kanoun, N. Cuppens-Boulahia, F. Cuppens, and J. Araujo, “Automated reaction based on risk analysis and attackers skills in intrusion detection systems,” pp. 117-124, October 2008.
-
(2008)
Automated reaction based on risk analysis and attackers skills in intrusion detection systems
, pp. 117-124
-
-
Kanoun, W.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Araujo, J.4
-
19
-
-
0038226150
-
-
Survivable Systems, Tech. Rep. Technical Note CMU/SEI-2001-TN-001
-
A. P. Moore, R. J. Ellison, and R. C. Linger, “Attack modeling for information security and survivability,” Survivable Systems, Tech. Rep. Technical Note CMU/SEI-2001-TN-001, 2001.
-
(2001)
Attack modeling for Information Security and Survivability
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
20
-
-
81455142742
-
Dynamic security risk management using bayesian attack graphs
-
N. Poolsappasit, R. Dewri, and I. Ray, “Dynamic security risk management using bayesian attack graphs,” IEEE Transactions on Dependable and Security Computing, vol. 9, no. 1, pp. 61-74, 2012.
-
(2012)
IEEE Transactions on Dependable and Security Computing
, vol.9
, Issue.1
, pp. 61-74
-
-
Poolsappasit, N.1
Dewri, R.2
Ray, I.3
-
22
-
-
84892424766
-
-
Metricon 2.0, CTO RedSeal Systems, Tech. Rep
-
A. Mayer, “Operational security risk metrics: Definitions, calculations, visualizations,” Metricon 2.0, CTO RedSeal Systems, Tech. Rep., 2007.
-
(2007)
Operational Security Risk Metrics: Definitions, Calculations, Visualizations
-
-
Mayer, A.1
-
25
-
-
79957876122
-
An attack surface metric
-
P. K. Manadhata and J. M. Wing, “An attack surface metric,” IEEE Transactions on Software Engineering, vol. 37, no. 3, pp. 371-386, 2010.
-
(2010)
IEEE Transactions on Software Engineering
, vol.37
, Issue.3
, pp. 371-386
-
-
Manadhata, P.K.1
Wing, J.M.2
|