-
1
-
-
84917675260
-
-
N. S. P.
-
Chew, E., Swanson, M., Stine, K., Bartol. N., Brown, A., & Robinson, W. (2008) Security metrics guide for information technology systems. 800-55, N. S. P.
-
(2008)
Security Metrics Guide for Information Technology Systems.
, pp. 800-855
-
-
Chew, E.1
Swanson, M.2
Stine, K.3
Bartol, N.4
Brown, A.5
Robinson, W.6
-
2
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
New York, NY, USA: ACM. Retrieved from
-
Ahn, Y., Han, S., Kwak, H., Moon, S., & Jeong, H. (2007). Analysis of topological characteristics of huge online social networking services. In Proc. of International conference on world wide web (WWW 2007) (pp. 835-844). New York, NY, USA: ACM. Retrieved from http://doi.ACM.org/10.1145/1242572.1242685 doi: 10.1145/1242572.1242685
-
(2007)
Proc. of International Conference on World Wide Web (WWW 2007)
, pp. 835-844
-
-
Ahn, Y.1
Han, S.2
Kwak, H.3
Moon, S.4
Jeong, H.5
-
3
-
-
34547491379
-
Lessons learned from the deployment of a high-interaction honeypot
-
Alata, E., Nicomette, V., Kaaniche, M., Dacier, M., & Herrb, M. (2006). Lessons learned from the deployment of a high-interaction honeypot. In Proc. of European dependable computing conference (EDCC 2006) (p. 39-46). doi:0.1109/EDCC.2006.17
-
(2006)
Proc. of European Dependable Computing Conference (EDCC 2006)
, pp. 39-46
-
-
Alata, E.1
Nicomette, V.2
Kaaniche, M.3
Dacier, M.4
Herrb, M.5
-
7
-
-
39749143545
-
The use of attack and protection trees to analyze security for an online banking system
-
Edge, K., Raines, R., Grimaila, M., Baldwin, R., Bennington, R., & Reuter, C. (2007). The use of attack and protection trees to analyze security for an online banking system. In Proc. of Hawaii international conference on system sciences (HICSS2007) (pp. 144-151).
-
(2007)
Proc. of Hawaii International Conference on System Sciences (HICSS2007)
, pp. 144-151
-
-
Edge, K.1
Raines, R.2
Grimaila, M.3
Baldwin, R.4
Bennington, R.5
Reuter, C.6
-
9
-
-
77950793246
-
Modeling modern network attacks and countermeasures using attack graphs
-
IEEE
-
Ingols, K., Chu, M., Lippmann, R., Webster, S., & Boyer, S. (2009). Modeling modern network attacks and countermeasures using attack graphs. In Proc. of annual computer security applications conference (ACSAC 2009) (pp. 117-126). IEEE.
-
(2009)
Proc. of Annual Computer Security Applications Conference (ACSAC 2009)
, pp. 117-126
-
-
Ingols, K.1
Chu, M.2
Lippmann, R.3
Webster, S.4
Boyer, S.5
-
11
-
-
78651494048
-
The deter project: Advancing the science of cyber security experimentation and test
-
Mirkovic, J., Benzel, T., Faber, T., Braden, R., Wroclawski, J., & Schwab, S. (2010). The deter project: Advancing the science of cyber security experimentation and test. In Proc. of IEEE international conference on technologies for homeland security (HST 2010) (p. 1-7). doi:10.1109/THS.2010.5655108
-
(2010)
Proc. of IEEE International Conference on Technologies for Homeland Security (HST 2010)
, pp. 1-7
-
-
Mirkovic, J.1
Benzel, T.2
Faber, T.3
Braden, R.4
Wroclawski, J.5
Schwab, S.6
-
14
-
-
70849136924
-
Threat modeling using attack trees
-
Retrieved from
-
Saini, V., Duan, Q., & Paruchuri, V. (2008). Threat modeling using attack trees. J. Comput. Sci. Coll., 23(4), 124-131. Retrieved from http://dl.ACM.org/citation.cfm?id=1352079.1352100
-
(2008)
J. Comput. Sci. Coll.
, vol.23
, Issue.4
, pp. 124-131
-
-
Saini, V.1
Duan, Q.2
Paruchuri, V.3
-
15
-
-
0005943436
-
Modeling security threats
-
Schneier, B. (1999). Modeling security threats. Dr. Dobb's journal, 24(12).
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
-
-
Schneier, B.1
-
17
-
-
84917675538
-
-
Retrieved from
-
King, S. (2010). Science of cybersecurity. Retrieved from http://www.fas.org/irp/agency/dod/jason/cyber.pdf
-
(2010)
Science of Cybersecurity
-
-
King, S.1
-
18
-
-
80051938080
-
Analysis of security data from a large computing organization
-
Sharma, A., Kalbarczyk, Z., Barlow, J., & Iyer, R. (2011). Analysis of security data from a large computing organization. In Proc. of IEEE/IFIP International Conference on dependable systems networks (DSN 2011) (p. 506-517). doi:10.1109/DSN.2011.5958263
-
(2011)
Proc. of IEEE/IFIP International Conference on Dependable Systems Networks (DSN 2011)
, pp. 506-517
-
-
Sharma, A.1
Kalbarczyk, Z.2
Barlow, J.3
Iyer, R.4
-
19
-
-
10644248607
-
-
(Tech. Rep.). CMU
-
Sheyner, O., Haines, J., Jha, S., & Wing, R. L. J. (2002). Automated generation and analysis of attack graphs (Tech. Rep.). CMU.
-
(2002)
Automated Generation and Analysis of Attack Graphs
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Wing, R.L.J.4
-
20
-
-
64549103812
-
Dynamic network security deployment under partial information
-
Theodorakopoulos, G., Baras, J., & Le Boudec, J. (2008). Dynamic network security deployment under partial information. In Proc. of annual allerton conference on communication, control, and computing (CCC 2008) (pp. 261-267). doi:10.1109/ALLERTON.2008.4797565
-
(2008)
Proc. of Annual Allerton Conference on Communication, Control, and Computing (CCC 2008)
, pp. 261-267
-
-
Theodorakopoulos, G.1
Baras, J.2
Le Boudec, J.3
-
21
-
-
77950788192
-
Evaluating network security with two-layer attack graphs
-
Xie, A., Cai, Z., Tang, C., Hu, J., & Chen, Z. (2009). Evaluating network security with two-layer attack graphs. In Proc. of annual computer security applications conference (ACSAC 2009) (p. 127-136). doi:10.1109/ACSAC.2009.22
-
(2009)
Proc. of Annual Computer Security Applications Conference (ACSAC 2009)
, pp. 127-136
-
-
Xie, A.1
Cai, Z.2
Tang, C.3
Hu, J.4
Chen, Z.5
-
22
-
-
84861589588
-
Towards temporal access control in cloud computing
-
Zhu, Y., Hu, H., Ahn, G., Huang, D., & Wang, S. (2012). Towards temporal access control in cloud computing. In Proc. of annual IEEE international conference on computer communications (INFOCOM 2012) (p. 2576-2580). doi:10.1109/INFCOM.2012.6195656
-
(2012)
Proc. of Annual IEEE International Conference on Computer Communications (INFOCOM 2012)
, pp. 2576-2580
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.3
Huang, D.4
Wang, S.5
|