A methodology for ranking cloud system vulnerabilities
暂无分享,去创建一个
Krishna Kavi | Mahadevan Gomathisankaran | Patrick Kamongi | Srujan Kotikela | K. Kavi | M. Gomathisankaran | Patrick Kamongi | Srujan Kotikela
[1] Jelena Mirkovic,et al. Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise , 2008, IEEE Transactions on Computers.
[2] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[3] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[4] Dimitrios Pendarakis,et al. Security audits of multi-tier virtual infrastructures in public infrastructure clouds , 2010, CCSW '10.
[5] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[6] Anoop Singhal,et al. VULCAN: Vulnerability Assessment Framework for Cloud Computing , 2013, 2013 IEEE 7th International Conference on Software Security and Reliability.
[7] Jeannette M. Wing,et al. Scenario graphs and attack graphs , 2004 .
[8] Richard Lippmann,et al. GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool , 2008, VizSEC.