|
Volumn 2002-January, Issue , 2002, Pages 49-63
|
Two formal analyses of attack graphs
|
Author keywords
Computer science; Contracts; Forensics; Greedy algorithms; Intrusion detection; Performance analysis; Polynomials; Safety; Security; US Department of Defense
|
Indexed keywords
ACCIDENT PREVENTION;
ALGORITHMS;
COMPUTER SCIENCE;
CONTRACTS;
COST BENEFIT ANALYSIS;
COST EFFECTIVENESS;
ECONOMIC AND SOCIAL EFFECTS;
GRAPHIC METHODS;
INTRUSION DETECTION;
ITERATIVE METHODS;
MARKOV PROCESSES;
MODEL CHECKING;
POLYNOMIALS;
RELIABILITY ANALYSIS;
SECURITY OF DATA;
SECURITY SYSTEMS;
FORENSICS;
GREEDY ALGORITHMS;
PERFORMANCE ANALYSIS;
SECURITY;
US DEPARTMENT OF DEFENSE;
GRAPH THEORY;
|
EID: 84948760464
PISSN: 10636900
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/CSFW.2002.1021806 Document Type: Conference Paper |
Times cited : (509)
|
References (19)
|