Minimizing Attack Graph Data Structures
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[2] Sushil Jajodia,et al. Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..
[3] Anoop Singhal,et al. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .
[4] Igor V. Kotenko,et al. Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool , 2002, RAID.
[5] Bharat K. Bhargava,et al. Extending Attack Graph-Based Security Metrics and Aggregating Their Application , 2012, IEEE Transactions on Dependable and Secure Computing.
[6] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[7] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Nir Friedman,et al. Probabilistic Graphical Models - Principles and Techniques , 2009 .
[9] Sushil Jajodia,et al. Measuring Security Risk of Networks Using Attack Graphs , 2010, Int. J. Next Gener. Comput..
[10] Catherine A. Meadows,et al. A representation of protocol attacks for risk assessment , 1996, Network Threats.
[11] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[12] Marc Dacier,et al. Quantitative Assessment of Operational Security: Models and Tools * , 1996 .
[13] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[14] J. Homer. A Sound and Practical Approach to Quantifying Security Risk in Enterprise Networks ∗ , 2009 .
[15] R. Cunningham,et al. Validating and Restoring Defense in Depth Using Attack Graphs , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[16] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[17] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[18] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[19] Barbara Kordy,et al. Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.
[20] John Hale,et al. A systematic approach to multi-stage network attack analysis , 2004, Second IEEE International Information Assurance Workshop, 2004. Proceedings..
[21] S. Nanda,et al. A highly scalable model for network attack identification and path prediction , 2007, Proceedings 2007 IEEE SoutheastCon.
[22] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[23] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[24] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[25] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[26] Sushil Jajodia,et al. A weakest-adversary security metric for network configuration security analysis , 2006, QoP '06.
[27] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[28] Sushil Jajodia,et al. Measuring network security using dynamic bayesian network , 2008, QoP '08.
[29] Ira S. Moskowitz,et al. An insecurity flow model , 1998, NSPW '97.
[30] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..