Ferret: a host vulnerability checking tool
暂无分享,去创建一个
[1] William H. Sanders,et al. Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[2] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[4] Kishor S. Trivedi,et al. Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[5] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[6] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[7] FrazerKen. Building secure software , 2002 .
[8] J. Lowry. An initial foray into understanding adversary planning and courses of action , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[9] Jeannette M. Wing,et al. Survivability analysis of networked systems , 2001, ICSE 2001.
[10] Jeannette M. Wing. Survivability analysis of networked systems , 2000, FORTE.
[11] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[12] William H. Sanders,et al. Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures , 2003, LADC.
[13] William H. Sanders,et al. Probabilistic Validation of Intrusion Tolerance 1 , 2002 .
[14] Marc Dacier,et al. Privilege Graph: an Extension to the Typed Access Matrix Model , 1994, ESORICS.
[15] Marc Dacier,et al. Quantitative Assessment of Operational Security: Models and Tools * , 1996 .
[16] Birgit Pfitzmann,et al. MAFTIA: Reference Model and Use Cases , 2000 .