메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 86-95

Efficient minimum-cost network hardening via exploit dependency graphs

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; COSTS; HARDENING; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84944727025     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2003.1254313     Document Type: Conference Paper
Times cited : (238)

References (18)
  • 11
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher
    • S. Jajodia, S. Noel, B. O'Berry, "Topological Analysis of Network Attack Vulnerability," in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher, 2003.
    • (2003) Managing Cyber Threats: Issues, Approaches and Challenges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 15
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • September/October
    • R. Ortalo, Y. Deswarte, M. Kaâniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Transactions on Software Engineering, 25(5):633-650, September/October 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.