A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
暂无分享,去创建一个
[1] Bharat B. Madan,et al. Modeling and quantification of security attributes of software systems , 2002, Proceedings International Conference on Dependable Systems and Networks.
[2] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[3] Barbara Kordy,et al. ADTool: Security Analysis with Attack- Defense Trees (Extended Version) , 2013, ArXiv.
[4] Barbara Kordy,et al. Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.
[5] William J. Stewart,et al. Introduction to the numerical solution of Markov Chains , 1994 .
[6] Ludovic Piètre-Cambacédès,et al. Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP) , 2010, 2010 European Dependable Computing Conference.
[7] Oleg Sheyner,et al. Attack scenario graphs for computer network threat analysis and prediction , 2003, Complex.
[8] Suku Nair,et al. Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification , 2014, NETCOM 2014.
[9] Rajesh Kumar,et al. Sequential and Parallel Attack Tree Modelling , 2015, SAFECOMP Workshops.
[10] Barbara Kordy,et al. ADTool: Security Analysis with Attack-Defense Trees , 2013, QEST.
[11] Reza Pulungan,et al. Time-Dependent Analysis of Attacks , 2014, POST.
[12] G. Manimaran,et al. PENET: A practical method and tool for integrated modeling of security attacks and countermeasures , 2009, Comput. Secur..
[13] Barbara Kordy,et al. A Probabilistic Framework for Security Scenarios with Dependent Actions , 2014, IFM.
[14] Alessandra Bagnato,et al. Attribute Decoration of Attack-Defense Trees , 2012, Int. J. Secur. Softw. Eng..
[15] R.F. Mills,et al. Analyzing Attack Trees using Generalized Stochastic Petri Nets , 2006, 2006 IEEE Information Assurance Workshop.
[16] Barbara Kordy,et al. Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent , 2010, GameSec.
[17] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[18] Olga Gadyatskaya,et al. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0 , 2016, QEST.