메뉴 건너뛰기




Volumn , Issue , 2005, Pages 113-128

MulVAL: A logic-based network security analyzer ∗

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; MODELING LANGUAGES; SPECIFICATIONS;

EID: 85076884574     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (565)

References (27)
  • 6
    • 0038062314 scopus 로고    scopus 로고
    • Complexity and expressive power of logic programming
    • Evgeny Dantsin, Thomas Eiter, Georg Gottlob, and Andrei Voronkov. Complexity and expressive power of logic programming. ACM Comput. Surv., 33(3):374–425, 2001.
    • (2001) ACM Comput. Surv. , vol.33 , Issue.3 , pp. 374-425
    • Dantsin, E.1    Eiter, T.2    Gottlob, G.3    Voronkov, A.4
  • 11
    • 0030644427 scopus 로고    scopus 로고
    • Filtering postures: Local enforcement for global policies
    • Oakland, CA
    • Joshua D. Guttman. Filtering postures: Local enforcement for global policies. In Proc. IEEE Symp. on Security and Privacy, pages 120–129, Oakland, CA, 1997.
    • (1997) Proc. IEEE Symp. On Security and Privacy , pp. 120-129
    • Guttman, J.D.1
  • 13
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerabity
    • Kumar, J. Srivastava, and A. Lazarevic, editors, chapter 5. Kluwer Academic Publisher
    • Sushil Jajodia, Steven Noel, and Brian O’Berry. Topological analysis of network attack vulnerabity. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challanges, chapter 5. Kluwer Academic Publisher, 2003.
    • (2003) Managing Cyber Threats: Issues, Approaches and Challanges
    • Jajodia, S.1    Noel, S.2    O’Berry, B.3
  • 18
    • 29744437544 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. October 2004. web fetched on October 28, 2004
    • National Institute of Standards and Technology. ICAT metabase. http://icat.nist.gov/icat.cfm, October 2004. web page fetched on October 28, 2004.
    • ICAT Metabase
  • 21
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1-2):189–209, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 189-209
    • Ramakrishnan, C.R.1    Sekar, R.2
  • 27
    • 85084161252 scopus 로고    scopus 로고
    • NetKuang–A multihost configuration vulnerability checker
    • San Jose, California
    • Dan Zerkle and Karl Levitt. NetKuang–A multihost configuration vulnerability checker. In Proc. of the 6th USENIX Security Symposium, pages 195–201, San Jose, California, 1996.
    • (1996) Proc. of the 6th USENIX Security Symposium , pp. 195-201
    • Zerkle, D.1    Levitt, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.