-
1
-
-
84953439481
-
A comprehensive approach for network attack forecasting
-
M. GhasemiGol, A. Ghaemi-Bafghi, and H. Takabi, "A comprehensive approach for network attack forecasting," Computers & Security, vol. 58, pp. 83-105, 2016
-
(2016)
Computers & Security
, vol.58
, pp. 83-105
-
-
GhasemiGol, M.1
Ghaemi-Bafghi, A.2
Takabi, H.3
-
2
-
-
84912553383
-
Cost-aware network hardening with limited budget using compact attack graphs
-
B. Yigit, G. Gur, and F. Alagoz, "Cost-Aware Network Hardening with Limited Budget Using Compact Attack Graphs," in Military Communications Conference (MILCOM), 2014 IEEE, 2014, pp. 152-157
-
(2014)
Military Communications Conference (MILCOM), 2014 IEEE
, pp. 152-157
-
-
Yigit, B.1
Gur, G.2
Alagoz, F.3
-
3
-
-
84978664319
-
Netsecuritas: An integrated attack graph-based security assessment tool for enterprise networks
-
N. Ghosh, I. Chokshi, M. Sarkar, S. K. Ghosh, A. K. Kaushik, and S. K. Das, "NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks," in Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015, p. 30
-
(2015)
Proceedings of the 2015 International Conference on Distributed Computing and Networking
, pp. 30
-
-
Ghosh, N.1
Chokshi, I.2
Sarkar, M.3
Ghosh, S.K.4
Kaushik, A.K.5
Das, S.K.6
-
5
-
-
84954355486
-
Cyber defenses for physical attacks and insider threats in cloud computing
-
J. Szefer, P. Jamkhedkar, D. Perez-Botero, and R. B. Lee, "Cyber defenses for physical attacks and insider threats in cloud computing," in Proceedings of the 9th ACM symposium on Information, computer and communications security, 2014, pp. 519-524
-
(2014)
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
, pp. 519-524
-
-
Szefer, J.1
Jamkhedkar, P.2
Perez-Botero, D.3
Lee, R.B.4
-
6
-
-
85017578696
-
Proactive intrusion prevention and response via attack graphs
-
S. Noel and S. Jajodia, "Proactive intrusion prevention and response via attack graphs," ed: Addison-Wesley Professional, 2009
-
(2009)
Ed: Addison-Wesley Professional
-
-
Noel, S.1
Jajodia, S.2
-
7
-
-
84866658774
-
Time-efficient and cost-effective network hardening using attack graphs
-
M. Albanese, S. Jajodia, and S. Noel, "Time-efficient and cost-effective network hardening using attack graphs," in Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, 2012, pp. 1-12
-
(2012)
Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on
, pp. 1-12
-
-
Albanese, M.1
Jajodia, S.2
Noel, S.3
-
9
-
-
0003673946
-
-
Ph. D. Thesis, Case Western Reserve Univ., Cleveland, Ohio
-
F. Gembicki, "Vector optimization for control with performance and parameter sensitivity indices," Ph. D. Thesis, Case Western Reserve Univ., Cleveland, Ohio, 1974.
-
(1974)
Vector Optimization for Control with Performance and Parameter Sensitivity Indices
-
-
Gembicki, F.1
|