메뉴 건너뛰기




Volumn , Issue , 2005, Pages 119-130

Attack-potential-based survivability modeling for high-consequence systems

Author keywords

[No Author keywords available]

Indexed keywords

RANDOM PROCESSES;

EID: 85070912494     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (37)

References (25)
  • 3
    • 0141441473 scopus 로고    scopus 로고
    • Simplifying fault-tolerance: Providing abstraction of crash failures
    • May
    • R. Bazzi and G. Neiger. Simplifying fault-tolerance: providing abstraction of crash failures. JACM, 48(3), May 2001.
    • (2001) JACM , vol.48 , Issue.3
    • Bazzi, R.1    Neiger, G.2
  • 5
    • 0029506865 scopus 로고
    • A comparison of performance evaluation process algebra and generalized stochastic petri nets
    • Durham, North Carolina, USA, October
    • S. Donatelli and J. Hillston. A comparison of performance evaluation process algebra and generalized stochastic petri nets. In Proc. Sixth Int. Workshop on Petri Nets and Performance Models, Durham, North Carolina, USA, October 1995.
    • (1995) Proc. Sixth Int. Workshop on Petri Nets and Performance Models
    • Donatelli, S.1    Hillston, J.2
  • 8
    • 0003581104 scopus 로고    scopus 로고
    • PhD thesis, University of Edinburgh, CST-107-94, also published by Cambridge University Press 1996
    • J. Hillston. A Compositional Approach to Performance Modeling. PhD thesis, University of Edinburgh, 1995. CST-107-94, also published by Cambridge University Press 1996.
    • (1995) A Compositional Approach to Performance Modeling
    • Hillston, J.1
  • 10
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrustion process based on attacker behavior
    • April
    • E. Jonsson and T. Olovssson. A quantitative model of the security intrustion process based on attacker behavior. IEEE Trans. on Software Engineering, 23(4), April 1997.
    • (1997) IEEE Trans. On Software Engineering , vol.23 , Issue.4
    • Jonsson, E.1    Olovssson, T.2
  • 15
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Sept.-Oct
    • R. Ortalo, Y. Deswarte, and M. Kaâniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25(5):633-650, Sept.-Oct. 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3
  • 17
    • 17644419145 scopus 로고    scopus 로고
    • Malicious- And accidental-fault tolerance for internet applications: Conceptual model and architecture
    • available as LAAS-CNRS Rep. 01426 or University of Newcastle upon Tyne CS-TR-749), November
    • D. Powell and R. Stroud. Malicious- and accidental-fault tolerance for internet applications: Conceptual model and architecture. Technical report, MAFTIA deliverable D2 (available as LAAS-CNRS Rep. 01426 or University of Newcastle upon Tyne CS-TR-749), November 2001.
    • (2001) Technical Report, MAFTIA Deliverable D2
    • Powell, D.1    Stroud, R.2
  • 18
    • 0024684041 scopus 로고
    • With microscope and tweezers: The worm from MIT's perspective
    • June
    • J. Rochlis and M. Eichin. With microscope and tweezers: the worm from MIT's perspective. CACM, 32:689-698, June 1989.
    • (1989) CACM , vol.32 , pp. 689-698
    • Rochlis, J.1    Eichin, M.2
  • 19
    • 26044481272 scopus 로고    scopus 로고
    • Distributed trust: Supporting fault-tolerance and attack-tolerance
    • Cornell Computer Science Department, January for publication
    • F. Schneider and L. Zhou. Distributed trust: Supporting fault-tolerance and attack-tolerance. Technical Report TR 2004-1924, Cornell Computer Science Department, January 2004. submitted for publication.
    • (2004) Technical Report TR 2004-1924
    • Schneider, F.1    Zhou, L.2
  • 20
    • 0034593315 scopus 로고    scopus 로고
    • Adversary work factor as a metric for information assurance
    • Ballycotton, County Cork, Ireland, September
    • G. Schudel and B Wood. Adversary work factor as a metric for information assurance. In Proc. New Security Paradigms Workshop, Ballycotton, County Cork, Ireland, September 2000.
    • (2000) Proc. New Security Paradigms Workshop
    • Schudel, G.1    Wood, B.2
  • 22
    • 84992355353 scopus 로고    scopus 로고
    • stealth. Phrack, 0x0b(0x3d):Phile 0x0e, July
    • stealth. Kernel rootkit experiences. Phrack, 0x0b(0x3d):Phile 0x0e, July 2003.
    • (2003) Kernel Rootkit Experiences
  • 24
    • 35248821244 scopus 로고    scopus 로고
    • Hiding intrusions: From the abnormal to the normal and beyond
    • F. Petitcolas, editor, Springer-Verlag
    • K. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In F. Petitcolas, editor, Information Hiding 2002 LNCS 2578, pages 1-17. Springer-Verlag, 2003.
    • (2003) Information Hiding 2002 LNCS , vol.2578 , pp. 1-17
    • Tan, K.1    McHugh, J.2    Killourhy, K.3
  • 25
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • August
    • K. Thompson. Reflections on trusting trust. CACM, 27(8), August 1984.
    • (1984) CACM , vol.27 , Issue.8
    • Thompson, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.