-
4
-
-
84966908924
-
An Analysis of CVSS v2 Environmental Scoring
-
9-11 Oct
-
A. Oluwaseun, Z. Pavol, L. Dale, R. Ron, "An Analysis of CVSS v2 Environmental Scoring" Privacy, Security, Risk and Trust (PASSAT) Date: 9-11 Oct. 2011
-
(2011)
Privacy, Security, Risk and Trust (PASSAT) Date
-
-
Oluwaseun, A.1
Pavol, Z.2
Dale, L.3
Ron, R.4
-
6
-
-
84967188888
-
A software application to analyze affects of temporal and environmental metrics on overall CVSS v2 score
-
Edmonton, Canada, October
-
Assad Ali, Pavol Zavarsky, Dale Lindskog, and Ron Ruhl, " A Software Application to Analyze Affects of Temporal and Environmental Metrics on Overall CVSS v2 Score", Concordia University College of Alberta, Edmonton, Canada, October 2010.
-
(2010)
Concordia University College of Alberta
-
-
Ali, A.1
Zavarsky, P.2
Lindskog, D.3
Ruhl, R.4
-
8
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
September
-
R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with quantitative evaluation tools for monitoring operational security," IEEE Transactions on Software Engineering, vol. 25, pp. 633-650, September 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
10
-
-
84874133684
-
Extending attack graph-based security metrics and aggregating their application
-
N. Idika and B. Bhargava, "Extending attack graph-based security metrics and aggregating their application," Dependable and Secure Computing, IEEE Transactions on, no. 99, pp. 1-1, 2010.
-
(2010)
Dependable and Secure Computing, IEEE Transactions on
, Issue.99
, pp. 1
-
-
Idika, N.1
Bhargava, B.2
-
11
-
-
79959542172
-
Toward measuring network security using attack graphs
-
L. Wang, A. Singhal, and S. Jajodia, "Toward measuring network security using attack graphs," in Proceedings of the 2007 ACM workshop on Quality Protection, pp. 49-54, 2007.
-
(2007)
Proceedings of the 2007 ACM Workshop on Quality Protection
, pp. 49-54
-
-
Wang, L.1
Singhal, A.2
Jajodia, S.3
-
12
-
-
71749094137
-
Dependability and security models
-
Trivedi KS, Kim DS, Roy A,Medhi D. Dependability and security models. Proc. DRCN, IEEE, 2009; 11-20.
-
(2009)
Proc. DRCN, IEEE
, pp. 11-20
-
-
Trivedi, K.S.1
Kim, D.S.2
Roy, A.3
Medhi, D.4
-
14
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. W. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated generation and analysis of attack graphs," in IEEE Symposium on Security and Privacy, 2002, pp. 273-284.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.W.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
16
-
-
79960020969
-
-
George Mason University, Fairfax, VA, Technical Report
-
S. Jajodia and S. Noel, "Advanced Cyber Attack Modeling, Analysis, and Visualization," George Mason University, Fairfax, VA, Technical Report 2010.
-
(2010)
Advanced Cyber Attack Modeling, Analysis, and Visualization
-
-
Jajodia, S.1
Noel, S.2
-
18
-
-
38149052484
-
Privilege graph: An extension to the typed access matrix model
-
M. Dacier, Y. Deswarte, "Privilege Graph: an Extension to the Typed Access Matrix Model,"Proc. ESORICS, 1994.
-
(1994)
Proc. ESORICS
-
-
Dacier, M.1
Deswarte, Y.2
-
19
-
-
84988504967
-
A graph-based system for network-vulnerability analysis
-
C. Phillips, L.P. Swiler, "A graph-based system for network-vulnerability analysis,"Proc. WNSP'98, pp.71-79.
-
Proc. WNSP'98
, pp. 71-79
-
-
Phillips, C.1
Swiler, L.P.2
-
20
-
-
84964504906
-
Computer-attack graph generation tool
-
L. Swiler, C. Phillips, D. Ellis, S. Chakerian, "Computer-attack graph generation tool," Proc. DISCEX01, pp.307-321.
-
Proc. DISCEX01
, pp. 307-321
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
21
-
-
84920266699
-
Cyber security analytics: A stochastic model for security quantification using absorbing markov chains
-
S. Abraham and S. Nair, "Cyber Security Analytics: A stochastic model for Security Quantification using Absorbing Markov Chains" Journal of Communications 2014, Volume 9 pp 899-907.
-
(2014)
Journal of Communications
, vol.9
, pp. 899-907
-
-
Abraham, S.1
Nair, S.2
-
25
-
-
60449090394
-
On stochastic modeling for integrated security and dependability evaluation
-
K. Sallhammar, B. Helvik, and S. Knapskog, "On stochastic modeling for integrated security and dependability evaluation," Journal of Networks, vol. 1, 2006.
-
(2006)
Journal of Networks
, vol.1
-
-
Sallhammar, K.1
Helvik, B.2
Knapskog, S.3
-
27
-
-
79960020969
-
-
George Mason University, Fairfax, VA, Technical Report
-
S. Jajodia and S. Noel, "Advanced Cyber Attack Modeling, Analysis, and Visualization," George Mason University, Fairfax, VA, Technical Report 2010.
-
(2010)
Advanced Cyber Attack Modeling, Analysis, and Visualization
-
-
Jajodia, S.1
Noel, S.2
-
28
-
-
84903287599
-
Overview on attack graph generation and visualization technology
-
Issue Date: Oct
-
Shengwei Yi, Yong Peng, Qi Xiong, Ting Wang, Zhonghua Dai, Haihui Gao, Junfeng Xu, Jiteng Wang and Lijuan Xu "Overview on attack graph generation and visualization technology", Anti-Counterfeiting, Security and Identification (ASID), 2013 IEEE International Conference on, Issue Date: Oct. 2013.
-
(2013)
Anti-Counterfeiting, Security and Identification (ASID), 2013 IEEE International Conference on
-
-
Yi, S.1
Peng, Y.2
Xiong, Q.3
Wang, T.4
Dai, Z.5
Gao, H.6
Xu, J.7
Wang, J.8
Xu, L.9
-
29
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
Dec
-
W. Arbaugh, W. Fithen, and J. McHugh, "Windows of vulnerability: a case study analysis," Computer, vol. 33, no. 12, pp. 52-59, Dec 2000
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.1
Fithen, W.2
McHugh, J.3
-
31
-
-
34547974467
-
Estimating software vulnerabilities
-
July-Aug
-
J. Jones, "Estimating software vulnerabilities," Security &Privacy,IEEE, vol. 5, no. 4, pp. 28-32, July-Aug. 2007.
-
(2007)
Security &Privacy,IEEE
, vol.5
, Issue.4
, pp. 28-32
-
-
Jones, J.1
-
32
-
-
34248370608
-
Large-scale vulnerability analysis
-
Frei, S., Fiedler, U., May, M., and Plattner, B. Large-scale vulnerability analysis. In Proceedings of the 2006 SIGCOMM workshop on Largescale attack defense (2006), pp. 131-138
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Largescale Attack Defense
, pp. 131-138
-
-
Frei, S.1
Fiedler, U.2
May, M.3
Plattner, B.4
-
33
-
-
26444448266
-
Security in open versus closed systems\-The dance of boltzmann, coase and moore
-
Law and Policy
-
Ross Anderson. Security in open versus closed systems\-The dance of Boltzmann, Coase and Moore. In Proceedings of Open Source Software: Economics, Law and Policy, 2002
-
(2002)
Proceedings of Open Source Software: Economics
-
-
Anderson, R.1
-
35
-
-
14744276335
-
Is finding security holes a good idea
-
Eric Rescorla. Is finding security holes a good idea? IEEE Security and Privacy, 3(1):14-19, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 14-19
-
-
Rescorla, E.1
-
38
-
-
50249085983
-
An attack graphbased probabilistic security metric
-
L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, "An attack graphbased probabilistic security metric," DAS 2008, LNCS 5094, pp. 283-296, 2008.
-
(2008)
DAS 2008, LNCS 5094
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
39
-
-
37849021677
-
Measuring overall security of network configurations using attack graphs
-
August
-
L. Wang, A. Singhal, and S. Jajodia, "Measuring overall security of network configurations using attack graphs," Data and Applications Security XXI, vol. 4602, pp. 98-112, August 2007.
-
(2007)
Data and Applications Security XXI
, vol.4602
, pp. 98-112
-
-
Wang, L.1
Singhal, A.2
Jajodia, S.3
-
40
-
-
84874122862
-
Analysis of attack graph-based metrics for quantification of network security
-
A. Kundu, N. Ghosh, I. Chokshi and SK. Ghosh, "Analysis of attack graph-based metrics for quantification of network security", India Conference (INDICON), IEEE, pages 530-535, 2012.
-
(2012)
India Conference (INDICON), IEEE
, pp. 530-535
-
-
Kundu, A.1
Ghosh, N.2
Chokshi, I.3
Ghosh, S.K.4
-
41
-
-
79960020969
-
-
George Mason University, Fairfax, VA, Technical Report
-
S. Jajodia and S. Noel, "Advanced Cyber Attack Modeling, Analysis, and Visualization," George Mason University, Fairfax, VA, Technical Report 2010.
-
(2010)
Advanced Cyber Attack Modeling, Analysis, and Visualization
-
-
Jajodia, S.1
Noel, S.2
|