Using Ontologies to Quantify Attack Surfaces
暂无分享,去创建一个
Borislava I. Simidchieva | Thomas C. Eskridge | Michael Atighetchi | Fusun Yaman | Marco M. Carvalho | Nicholas Paltzer
[1] Zahid Anwar,et al. Ontology for attack detection: An intelligent approach to web application security , 2014, Comput. Secur..
[2] Malek Ben Salem,et al. Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology , 2015, STIDS.
[3] Borislava I. Simidchieva,et al. Experimentation Support for Cyber Security Evaluations , 2016, CISRC.
[4] Leo Obrst,et al. Developing an Ontology of the Cyber Security Domain , 2012, STIDS.
[5] Stefan Fenz,et al. Ontological Mapping of Information Security Best-Practice Guidelines , 2009, BIS.
[6] Antanas Cenys,et al. Security Ontology for Adaptive Mapping of Security Standards , 2013, Int. J. Comput. Commun. Control.
[7] Lorrie Faith Cranor,et al. Building an Ontology of Cyber Security , 2014, STIDS.
[8] Cleotilde Gonzalez,et al. Ontology-based Adaptive Systems of Cyber Defense , 2015, STIDS.
[9] Simon N. Foley,et al. Management of security policy configuration using a Semantic Threat Graph approach , 2011, J. Comput. Secur..
[10] Adam Shostack,et al. Threat Modeling: Designing for Security , 2014 .
[11] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[12] Mirko Čubrilo,et al. Ontology in Information Security , 2015 .