메뉴 건너뛰기




Volumn , Issue , 2012, Pages 74-81

HARMs: Hierarchical attack representation models for network security analysis

Author keywords

Attack graph; Attack tree; Complexity analysis; Hierarchical model; Scalability; Security assessment

Indexed keywords

COMPLEX NETWORKS; ELECTRIC NETWORK TOPOLOGY; GRAPHIC METHODS; HIERARCHICAL SYSTEMS; SCALABILITY; TREES (MATHEMATICS);

EID: 84917684585     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (55)

References (23)
  • 2
    • 35348871999 scopus 로고    scopus 로고
    • Analysis of topological characteristics of huge online social networking services
    • New York, NY, USA: ACM. Retrieved from
    • Ahn, Y., Han, S., Kwak, H., Moon, S., & Jeong, H. (2007). Analysis of topological characteristics of huge online social networking services. In Proc. of International conference on world wide web (WWW 2007) (pp. 835-844). New York, NY, USA: ACM. Retrieved from http://doi.ACM.org/10.1145/1242572.1242685 doi: 10.1145/1242572.1242685
    • (2007) Proc. of International Conference on World Wide Web (WWW 2007) , pp. 835-844
    • Ahn, Y.1    Han, S.2    Kwak, H.3    Moon, S.4    Jeong, H.5
  • 12
    • 0038226150 scopus 로고    scopus 로고
    • Attack modeling for information security and survivability
    • Moore, A., Ellison, R., & Linger, R. (2001). Attack modeling for information security and survivability. CMU/SEI-2001-TN-001.
    • (2001) CMU/SEI-2001-TN-001
    • Moore, A.1    Ellison, R.2    Linger, R.3
  • 14
    • 70849136924 scopus 로고    scopus 로고
    • Threat modeling using attack trees
    • Retrieved from
    • Saini, V., Duan, Q., & Paruchuri, V. (2008). Threat modeling using attack trees. J. Comput. Sci. Coll., 23(4), 124-131. Retrieved from http://dl.ACM.org/citation.cfm?id=1352079.1352100
    • (2008) J. Comput. Sci. Coll. , vol.23 , Issue.4 , pp. 124-131
    • Saini, V.1    Duan, Q.2    Paruchuri, V.3
  • 15
    • 0005943436 scopus 로고    scopus 로고
    • Modeling security threats
    • Schneier, B. (1999). Modeling security threats. Dr. Dobb's journal, 24(12).
    • (1999) Dr. Dobb's Journal , vol.24 , Issue.12
    • Schneier, B.1
  • 17
    • 84917675538 scopus 로고    scopus 로고
    • Retrieved from
    • King, S. (2010). Science of cybersecurity. Retrieved from http://www.fas.org/irp/agency/dod/jason/cyber.pdf
    • (2010) Science of Cybersecurity
    • King, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.