메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 49-63

Two formal analyses of attack graphs

Author keywords

Computer science; Contracts; Forensics; Greedy algorithms; Intrusion detection; Performance analysis; Polynomials; Safety; Security; US Department of Defense

Indexed keywords

ACCIDENT PREVENTION; ALGORITHMS; COMPUTER SCIENCE; CONTRACTS; COST BENEFIT ANALYSIS; COST EFFECTIVENESS; ECONOMIC AND SOCIAL EFFECTS; GRAPHIC METHODS; INTRUSION DETECTION; ITERATIVE METHODS; MARKOV PROCESSES; MODEL CHECKING; POLYNOMIALS; RELIABILITY ANALYSIS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84948760464     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2002.1021806     Document Type: Conference Paper
Times cited : (509)

References (19)
  • 3
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • Aug
    • R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput., C-35(8):677-691, Aug. 1986.
    • (1986) IEEE Trans. Comput. , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 11
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Sept/Oct
    • R. Ortalo, Y. Deswarte, and M. Kaaniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25/5:633-650, Sept/Oct 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 12


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.