-
1
-
-
20444498659
-
Topological Analysis of Network Attack Vulnerability
-
V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher
-
S. Jajodia, S. Noel, and B. O’Berry (2005) Topological Analysis of Network Attack Vulnerability, in Managing Cyber Threats: Issues, Approaches and Challenges, V. Kumar, J. Srivastava, A. Lazarevic (eds.), Kluwer Academic Publisher.
-
(2005)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
Jajodia, S.1
Noel, S.2
O’Berry, B.3
-
2
-
-
85116514900
-
-
last retrieved April
-
R. Deraison, Nessus, http://www.nessus.org, last retrieved April 2007.
-
(2007)
Nessus
-
-
Deraison, R.1
-
3
-
-
18244386905
-
-
last retrieved April
-
3eEye Digital Security, Retina Network Security Scanner, last retrieved April 2007.
-
(2007)
Retina Network Security Scanner
-
-
-
4
-
-
42649129210
-
-
last retrieved April
-
Foundstone, FoundScan Frequently Asked Questions, http://www.foundstone. com/pdf/foundscan_general_faq.pdf, last retrieved April 2007.
-
(2007)
FoundScan Frequently Asked Questions
-
-
-
5
-
-
85116524588
-
-
last retrieved April
-
Symantec Corporation, Symantec Discovery Overview, http://www.symantec. com/enterprise/products/overview.jsp?pcid=1025/&pvid=923_1, last retrieved April 2007.
-
(2007)
Symantec Discovery Overview
-
-
Corporation, S.1
-
7
-
-
85116548291
-
-
last retrieved April
-
Security Focus, Bugtraq Vulnerabilities, http://www.securityfocus.com/ vulnerabilities, last retrieved April 2007.
-
(2007)
Bugtraq Vulnerabilities
-
-
Focus, S.1
-
10
-
-
10644248607
-
Automated Generation and Analysis of Attack Graphs
-
Oakland, CA
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J. Wing, “Automated Generation and Analysis of Attack Graphs, " in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA.
-
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
11
-
-
85089177976
-
Two Formal Analyses of Attack Graphs
-
Nova Scotia, Canada
-
S. Jha, O. Sheyner, J. Wing, Two Formal Analyses of Attack Graphs, in Proceedings of the 15th Computer Security Foundation Workshop, Nova Scotia, Canada.
-
Proceedings of the 15th Computer Security Foundation Workshop
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
12
-
-
85084775051
-
Scalable, Graph-Based Network Vulnerability Analysis
-
Washington, DC
-
P. Ammann, D.Wijesekera, S. Kaushik, Scalable, Graph-Based Network Vulnerability Analysis, in Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC.
-
Proceedings of the 9th ACM Conference on Computer and Communications Security
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
13
-
-
85116534272
-
Efficient Minimum-Cost Network Hardening via Exploit Dependency Graphs
-
Las Vegas, Nevada
-
S. Noel, S. Jajodia, B. O’Berry, M. Jacobs, Efficient Minimum-Cost Network Hardening via Exploit Dependency Graphs, in Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada.
-
Proceedings of the 19th Annual Computer Security Applications Conference
-
-
Noel, S.1
Jajodia, S.2
O’Berry, B.3
Jacobs, M.4
-
14
-
-
33750984193
-
Minimum-Cost Network Hardening Using Attack Graphs
-
L. Wang, S. Noel, S. Jajodia, Minimum-Cost Network Hardening Using Attack Graphs, Computer Communications, 29(18), pp. 3812-3824.
-
Computer Communications
, vol.29
, Issue.18
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
-
16
-
-
85116551944
-
Multiple Coordinated Views for Network Attack Graphs
-
Minneapolis, Minnesota
-
S. Noel, M. Jacobs, P. Kalapa. S. Jajodia, Multiple Coordinated Views for Network Attack Graphs, in Proceedings of the 2nd International Workshop on Visualization for Computer Security, Minneapolis, Minnesota.
-
Proceedings of the 2nd International Workshop on Visualization for Computer Security
-
-
Noel, S.1
Jacobs, M.2
Jajodia, P.3
Kalapa, S.4
-
17
-
-
85045914526
-
Constructing Attack Scenarios through Correlation of Intrusion Alerts
-
Washington, DC
-
P. Ning, Y. Cui, D. Reeves, Constructing Attack Scenarios through Correlation of Intrusion Alerts, in Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC.
-
Proceedings of the 9th ACM Conference on Computer and Communications Security
-
-
Ning, P.1
Cui, Y.2
Reeves, D.3
-
18
-
-
21644481812
-
Correlating Intrusion Events and Building Attack Scenarios through Attack Graph Distances
-
Tucson, Arizona
-
S. Noel, E. Robertson, S. Jajodia, Correlating Intrusion Events and Building Attack Scenarios through Attack Graph Distances, in Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, Arizona.
-
Proceedings of the 20th Annual Computer Security Applications Conference
-
-
Noel, S.1
Robertson, E.2
Jajodia, S.3
-
19
-
-
85116562072
-
Hypothesizing, and Predicting Network Intrusion Alerts
-
Milan, Italy
-
L. Wang, A. Liu, S. Jajodia, An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Network Intrusion Alerts, in Proceedings of the 10th European Symposium on Research in Computer Security, Milan, Italy.
-
Proceedings of the 10th European Symposium on Research in Computer Security
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
Efficient, A.4
-
20
-
-
85116514361
-
Using Attack Graphs for Correlating, Hypothesizing, and Predicting Network Intrusion Alerts
-
L.Wang, A. Liu, S. Jajodia, Using Attack Graphs for Correlating, Hypothesizing, and Predicting Network Intrusion Alerts, Computer Communications, 29(15).
-
Computer Communications
, vol.29
, pp. 15
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
|