메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Matching attack patterns to security vulnerabilities in software-intensive system designs

Author keywords

Design; Regular expression; Security

Indexed keywords

APPLICATION PROGRAMS; DESIGN; SECURITY OF DATA; STUDENTS; SYSTEMS ANALYSIS;

EID: 85085406935     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1083200.1083211     Document Type: Conference Paper
Times cited : (33)

References (19)
  • 2
    • 33846530368 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W. A. Arbaugh, W. L. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis, " IEEE, vol. 3, 12 pp. 52-59, 2000.
    • (2000) IEEE , vol.3 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 3
    • 0002840269 scopus 로고
    • Industrial metrics top 10 list
    • B. Boehm, "Industrial Metrics Top 10 List, " IEEE Software, vol. 4, 5 pp. 84-85, 1987.
    • (1987) IEEE Software , vol.4 , Issue.5 , pp. 84-85
    • Boehm, B.1
  • 6
    • 0038349200 scopus 로고    scopus 로고
    • MOPS: An infrastructure for examining security properties of software
    • H. Chen and D. Wagner, "MOPS: an Infrastructure for Examining Security Properties of Software, " ACM CCS, 2002.
    • (2002) ACM CCS
    • Chen, H.1    Wagner, D.2
  • 8
    • 85027554530 scopus 로고    scopus 로고
    • Analyzing security attacks to generate patterns from vulnerable architectural patterns
    • July
    • M. Gegick, "Analyzing Security Attacks to Generate Patterns from Vulnerable Architectural Patterns", MS, NCSU, Raleigh. July, 2004
    • (2004) MS, NCSU, Raleigh
    • Gegick, M.1
  • 14
    • 0034593376 scopus 로고    scopus 로고
    • Attack net penetration testing
    • J. P. McDermott, "Attack Net Penetration Testing, " ACM SIGSAC, pp. 15-21, 2000.
    • (2000) ACM SIGSAC , pp. 15-21
    • McDermott, J.P.1
  • 16
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats, " dr
    • B. Schneier, "Attack Trees: Modeling Security Threats, " Dr. Dobb's Journal, 1999.
    • (1999) Dobb's Journal
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.