-
1
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
May
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated generation and analysis of attack graphs, " in Proceedings of the IEEE Symposium on Security and Privacy, pp. 273-284, May 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
2
-
-
79959542172
-
Towardmeasuringnetwork security using attack graphs
-
October
-
L. Wang, A. Singhal, andS. Jajodia, "Towardmeasuringnetwork security using attack graphs, " in Proceedings of the ACM Workshop on Quality of Protection, pp. 49-54, October 2007.
-
(2007)
Proceedings of the ACM Workshop on Quality of Protection
, pp. 49-54
-
-
Wang, L.1
Singhal, A.2
Jajodia, S.3
-
3
-
-
49749101200
-
Cyber attack modeling and simulation for network security analysis
-
Washington, DC, USA December
-
M. E. Kuhl, J. Kistner, K. Costantini, and M. Sudit, "Cyber attack modeling and simulation for network security analysis, " in Proceedings of the Winter Simulation Conference (WSC '07), pp. 1180-1188, Washington, DC, USA, December 2007.
-
(2007)
Proceedings of the Winter Simulation Conference (WSC '07)
, pp. 1180-1188
-
-
Kuhl, M.E.1
Kistner, J.2
Costantini, K.3
Sudit, M.4
-
5
-
-
84874048575
-
Cyber attacks prediction model based on Bayesian network
-
Singapore, December
-
J. Wu, L. Yin, and Y. Guo, "Cyber attacks prediction model based on Bayesian network, " in Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS '12), pp. 730-731, Singapore, December 2012.
-
(2012)
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems (ICPADS '12)
, pp. 730-731
-
-
Wu, J.1
Yin, L.2
Guo, Y.3
-
6
-
-
84911919980
-
Study on techniques for providing enhanced security during online exams
-
N. S. Anusha, T. S. Soujanya, and D. S. Vasavi, "Study on techniques for providing enhanced security during online exams, " International Journal of Engineering Inventions, vol. 1, no. 1, pp. 32-37, 2012.
-
(2012)
International Journal of Engineering Inventions
, vol.1
, Issue.1
, pp. 32-37
-
-
Anusha, N.S.1
Soujanya, T.S.2
Vasavi, D.S.3
-
7
-
-
84882772731
-
A Bayesian network model for predicting insider threats
-
May
-
E. T. Axelrad, P. J. Sticha, O. Brdiczka, and J. Shen, "A Bayesian network model for predicting insider threats, " in Proceedings of the 2nd IEEE Security and PrivacyWorkshops (SPW'13), pp. 82-89, May 2013.
-
(2013)
Proceedings of the 2nd IEEE Security and PrivacyWorkshops (SPW'13)
, pp. 82-89
-
-
Axelrad, E.T.1
Sticha, P.J.2
Brdiczka, O.3
Shen, J.4
-
8
-
-
84929622761
-
Cyber security quantification model
-
M. A. Khan and M. Hussain, "Cyber security quantification model, " Bahria University Journal of Information and Communication Technology, vol. 3, no. 1, pp. 23-27, 2010.
-
(2010)
Bahria University Journal of Information and Communication Technology
, vol.3
, Issue.1
, pp. 23-27
-
-
Khan, M.A.1
Hussain, M.2
-
9
-
-
84929641576
-
-
Tech. Rep. DM-0000143, Program Software Engineering Institute, Carnegie Mellon University
-
A. P. Moore, D. A. Mundie, and M. L. Collins, "Asystem dynamics model for investigating early detection of insider threat risk, " Tech. Rep. DM-0000143, Program Software Engineering Institute, Carnegie Mellon University, 2013.
-
(2013)
Asystem Dynamics Model for Investigating Early Detection of Insider Threat Risk
-
-
Moore, A.P.1
Mundie, D.A.2
Collins, M.L.3
-
11
-
-
84911948987
-
Computer-based test security and result integrity
-
O. T. Oluwatosin and D. D. Samson, "Computer-based test security and result integrity, " International Journal of Computer and Information Technology, vol. 2, no. 2, pp. 324-329, 2013.
-
(2013)
International Journal of Computer and Information Technology
, vol.2
, Issue.2
, pp. 324-329
-
-
Oluwatosin, O.T.1
Samson, D.D.2
-
12
-
-
84886430853
-
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
-
IEEE Press, May
-
L. K. Shar, H. Beng Kuan Tan, and L. C. Briand, "Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis, " in Proceedings of the 35th International Conference on Software Engineering (ICSE '13), pp. 642-651, IEEE Press, May 2013.
-
(2013)
Proceedings of the 35th International Conference on Software Engineering (ICSE '13)
, pp. 642-651
-
-
Shar, L.K.1
Beng Kuan Tan, H.2
Briand, L.C.3
-
13
-
-
51049107864
-
-
National Institute of Standards and Technology, Carnegie Mellon University
-
P. Mell, K. Scarfone, and S. Romanosky, A Complete Guide to the Common Vulnerability Scoring System Version 2. 0, National Institute of Standards and Technology, Carnegie Mellon University, 2007.
-
(2007)
A Complete Guide to the Common Vulnerability Scoring System Version 2. 0
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
16
-
-
84929641578
-
-
Sensitive Data Protection Vulnerability OWASP
-
Sensitive Data Protection Vulnerability, OWASP, https://www. owasp. org/index. php/Category:Sensitive Data Protection Vulnerability.
-
-
-
-
17
-
-
84929641579
-
-
https://www. owasp. org/index. php/Category:Vulnerability.
-
-
-
|