Measuring network security using dynamic bayesian network
暂无分享,去创建一个
Sushil Jajodia | Lingyu Wang | Anoop Singhal | Marcel Frigault | S. Jajodia | A. Singhal | Lingyu Wang | Marcel Frigault
[1] Sushil Jajodia,et al. Toward measuring network security using attack graphs , 2007, QoP '07.
[2] Grigore Rosu,et al. Efficient monitoring of safety properties , 2004, International Journal on Software Tools for Technology Transfer.
[3] Andrew Jaquith. Security Metrics: Replacing Fear, Uncertainty, and Doubt , 2007 .
[4] Mattia Monga,et al. Assessing the risk of using vulnerable components , 2006, Quality of Protection.
[5] Lingyu Wang,et al. Measuring Network Security Using Bayesian Network-Based Attack Graphs , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.
[6] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[7] Sushil Jajodia,et al. Interactive Analysis of Attack Graphs Using Relational Queries , 2006, DBSec.
[8] Fabio Massacci,et al. From Trust to Dependability through Risk Analysis , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[9] T. Oyama,et al. WORKSHOP I , 1997 .
[10] Michael K. Reiter,et al. Authentication metric analysis and design , 1999, TSEC.
[11] Sushil Jajodia,et al. A weakest-adversary security metric for network configuration security analysis , 2006, QoP '06.
[12] Marianne Swanson,et al. Security metrics guide for information technology systems , 2003 .
[13] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[14] Vojkan Mihajlovic,et al. Dynamic Bayesian Networks: A State of the Art , 2001 .
[15] Sushil Jajodia,et al. Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..
[16] Z. G. Ruthberg,et al. Technology Assessment: Methods for Measuring the Level of Computer Security , 1985 .
[17] Miles McQueen,et al. Measuring the attack surfaces of two FTP daemons , 2006, QoP '06.
[18] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[19] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[20] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[21] Nick Cercone,et al. Privacy intrusion detection using dynamic Bayesian networks , 2006, ICEC '06.
[22] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[23] Yu Liu,et al. Network vulnerability assessment using Bayesian networks , 2005, SPIE Defense + Commercial Sensing.
[24] Sushil Jajodia,et al. Measuring the Overall Security of Network Configurations Using Attack Graphs , 2007, DBSec.
[25] John McHugh. Quality of protection: measuring the unmeasurable? , 2006, QoP '06.