-
1
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
Washington, DC, November
-
Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002.
-
(2002)
Proceedings of 9th ACM Conference on Computer and Communications Security
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
3
-
-
84940102288
-
Firmato: A novel firewall management toolkit
-
Yair Bartal, Alain J. Mayer, Kobbi Nissim, and Avishai Wool. Firmato: A novel firewall management toolkit. In IEEE Symposium on Security and Privacy, pages 17–31, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.J.2
Nissim, K.3
Wool, A.4
-
4
-
-
84964467772
-
Automatic management of network security policy
-
Anaheim, California, June
-
James Burns, Aileen Cheng, Proveen Gurung, David Martin, Jr., S. Raj Rajagopalan, Prasad Rao, and Alathurai V. Surendran. Automatic management of network security policy. In DARPA Information Survivability Conference and Exposition (DISCEX II’01), volume 2, Anaheim, California, June 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II’01)
, vol.2
-
-
Burns, J.1
Cheng, A.2
Gurung, P.3
Martin, D.4
Rajagopalan, S.R.5
Rao, P.6
Surendran, A.V.7
-
6
-
-
0038062314
-
Complexity and expressive power of logic programming
-
Evgeny Dantsin, Thomas Eiter, Georg Gottlob, and Andrei Voronkov. Complexity and expressive power of logic programming. ACM Comput. Surv., 33(3):374–425, 2001.
-
(2001)
ACM Comput. Surv.
, vol.33
, Issue.3
, pp. 374-425
-
-
Dantsin, E.1
Eiter, T.2
Gottlob, G.3
Voronkov, A.4
-
9
-
-
29344440486
-
Formal modeling of vulnerabilities
-
William L. Fithen, Shawn V. Hernan, Paul F. O’Rourke, and David A. Shinberg. Formal modeling of vulnerabilities. Bell Labs technical journal, 8(4):173–186, 2004.
-
(2004)
Bell Labs Technical Journal
, vol.8
, Issue.4
, pp. 173-186
-
-
Fithen, W.L.1
Hernan, S.V.2
O’Rourke, P.F.3
Shinberg, D.A.4
-
10
-
-
84990606045
-
Unfounded sets and well-founded semantics for general logic programs
-
New York, NY, USA, ACM Press
-
Allen Van Gelder, Kenneth Ross, and John S. Schlipf. Unfounded sets and well-founded semantics for general logic programs. In PODS’88: Proceedings of the seventh ACM SIGACT-SIGMODSIGART symposium on Principles of database systems, pages 221–230, New York, NY, USA, 1988. ACM Press.
-
(1988)
PODS’88: Proceedings of the Seventh ACM SIGACT-SIGMODSIGART Symposium on Principles of Database Systems
, pp. 221-230
-
-
van Gelder, A.1
Ross, K.2
Schlipf, J.S.3
-
11
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
Oakland, CA
-
Joshua D. Guttman. Filtering postures: Local enforcement for global policies. In Proc. IEEE Symp. on Security and Privacy, pages 120–129, Oakland, CA, 1997.
-
(1997)
Proc. IEEE Symp. On Security and Privacy
, pp. 120-129
-
-
Guttman, J.D.1
-
13
-
-
20444498659
-
Topological analysis of network attack vulnerabity
-
Kumar, J. Srivastava, and A. Lazarevic, editors, chapter 5. Kluwer Academic Publisher
-
Sushil Jajodia, Steven Noel, and Brian O’Berry. Topological analysis of network attack vulnerabity. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challanges, chapter 5. Kluwer Academic Publisher, 2003.
-
(2003)
Managing Cyber Threats: Issues, Approaches and Challanges
-
-
Jajodia, S.1
Noel, S.2
O’Berry, B.3
-
18
-
-
29744437544
-
-
National Institute of Standards and Technology. October 2004. web fetched on October 28, 2004
-
National Institute of Standards and Technology. ICAT metabase. http://icat.nist.gov/icat.cfm, October 2004. web page fetched on October 28, 2004.
-
ICAT Metabase
-
-
-
19
-
-
38049012177
-
Online justification for tabled logic programs
-
April
-
Giridhar Pemmasani, Hai-Feng Guo, Yifei Dong, C.R. Ramakrishnan, and I.V. Ramakrishnan. Online justification for tabled logic programs. In The 7th International Symposium on Functional and Logic Programming, April 2004.
-
(2004)
The 7th International Symposium on Functional and Logic Programming
-
-
Pemmasani, G.1
Guo, H.-F.2
Dong, Y.3
Ramakrishnan, C.R.4
Ramakrishnan, I.V.5
-
21
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1-2):189–209, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 189-209
-
-
Ramakrishnan, C.R.1
Sekar, R.2
-
22
-
-
0000008990
-
XSB: A system for efficiently computing well-founded semantics
-
Dagstuhl, Germany, July Springer Verlag
-
Prasad Rao, Konstantinos F. Sagonas, Terrance Swift, David S. Warren, and Juliana Freire. XSB: A system for efficiently computing well-founded semantics. In Proceedings of the 4th International Conference on Logic Programming and Non-Monotonic Reasoning (LPNMR’97), pages 2–17, Dagstuhl, Germany, July 1997. Springer Verlag.
-
(1997)
Proceedings of the 4th International Conference on Logic Programming and Non-Monotonic Reasoning (LPNMR’97)
, pp. 2-17
-
-
Rao, P.1
Sagonas, K.F.2
Swift, T.3
Warren, D.S.4
Freire, J.5
-
24
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 254–265, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 254-265
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
26
-
-
33745301111
-
-
November Web fetched on October 28, 2004
-
Matthew Wojcik, Tiffany Bergeron, Todd Wittbold, and Robert Roberge. Introduction to OVAL: A new language to determine the presence of software vulnerabilities. http://oval.mitre.org/documents/docs03/intro/intro.html, November 2003. Web page fetched on October 28, 2004.
-
(2003)
Introduction to OVAL: A New Language to Determine the Presence of Software Vulnerabilities
-
-
Wojcik, M.1
Bergeron, T.2
Wittbold, T.3
Roberge, R.4
-
27
-
-
85084161252
-
NetKuang–A multihost configuration vulnerability checker
-
San Jose, California
-
Dan Zerkle and Karl Levitt. NetKuang–A multihost configuration vulnerability checker. In Proc. of the 6th USENIX Security Symposium, pages 195–201, San Jose, California, 1996.
-
(1996)
Proc. of the 6th USENIX Security Symposium
, pp. 195-201
-
-
Zerkle, D.1
Levitt, K.2
|