Performance Analysis of Scalable Attack Representation Models
暂无分享,去创建一个
[1] Yi Zhang,et al. A Scalable Approach to Analyzing Network Security using Compact Attack Graphs , 2010, J. Networks.
[2] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[3] John Hale,et al. A systematic approach to multi-stage network attack analysis , 2004, Second IEEE International Information Assurance Workshop, 2004. Proceedings..
[4] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[5] Xinming Ou,et al. Identifying Critical Attack Assets in Dependency Attack Graphs , 2008, ESORICS.
[6] Zhong Chen,et al. Evaluating Network Security With Two-Layer Attack Graphs , 2009, 2009 Annual Computer Security Applications Conference.
[7] Joel Winstead,et al. Using Attack Graphs to Design Systems , 2007, IEEE Security & Privacy.
[8] Richard Lippmann,et al. Practical Attack Graph Generation for Network Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[9] Gregory Ewing,et al. Akaroa-2: Exploiting Network Computing by Distributing Stochastic Simulation , 1999 .
[10] Krzysztof Pawlikowski,et al. On credibility of simulation studies of telecommunication networks , 2002, IEEE Commun. Mag..
[11] Jin B. Hong,et al. HARMs: Hierarchical Attack Representation Models for Network Security Analysis , 2012, AISM 2012.
[12] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[13] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[14] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[15] Richard Lippmann,et al. Modeling Modern Network Attacks and Countermeasures Using Attack Graphs , 2009, 2009 Annual Computer Security Applications Conference.
[16] Sushil Jajodia,et al. Time-efficient and cost-effective network hardening using attack graphs , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[17] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[18] Martín Abadi,et al. Code-Carrying Authorization , 2008, ESORICS.
[19] Indrajit Ray,et al. Optimal security hardening using multi-objective optimization on attack tree models of networks , 2007, CCS '07.
[20] Richard A. Raines,et al. A framework for analyzing and mitigating the vulnerabilities of complex systems via attack and protection trees , 2007 .
[21] Vamsi Paruchuri,et al. Threat modeling using attack trees , 2008 .
[22] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[23] Sushil Jajodia,et al. Understanding complex network attack graphs through clustered adjacency matrices , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[24] Phongphun Kijsanayothin,et al. Host-Centric Model Checking for Network Vulnerability Analysis , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).