Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca
暂无分享,去创建一个
Rasool Jalili | Ali Movaghar-Rahimabadi | Marjan Sirjani | Hamid Reza Shahriari | Mohammad Sadegh Makarem
[1] Rasool Jalili,et al. Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities , 2007, Comput. Secur..
[2] Mohammad Mahdi Jaghoori,et al. A front-end tool for automated abstraction and modular verification of actor-based models , 2004, Proceedings. Fourth International Conference on Application of Concurrency to System Design, 2004. ACSD 2004..
[3] Mohammad Mahdi Jaghoori,et al. Efficient Symmetry Reduction for an Actor-Based Model , 2005, ICDCIT.
[4] Gul A. Agha,et al. ACTORS - a model of concurrent computation in distributed systems , 1985, MIT Press series in artificial intelligence.
[5] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[6] Frank S. de Boer,et al. Model Checking, Automated Abstraction, and Compositional Verification of Rebeca Models , 2005, J. Univers. Comput. Sci..
[7] Carolyn L. Talcott,et al. A foundation for actor computation , 1997, Journal of Functional Programming.
[8] Sushil Jajodia,et al. Correlating intrusion events and building attack scenarios through attack graph distances , 2004, 20th Annual Computer Security Applications Conference.
[9] Frank S. de Boer,et al. Modeling and Verification of Reactive Systems using Rebeca , 2004, Fundam. Informaticae.
[10] Gavin Lowe,et al. Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area , 2002, FASec.
[11] Karl N. Levitt,et al. NetKuang - A Multi-Host Configuration Vulnerability Checker , 1996, USENIX Security Symposium.
[12] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[13] Gavin Lowe,et al. Using data-independence in the analysis of intrusion detection systems , 2005, Theor. Comput. Sci..
[14] Marc Dacier,et al. Privilege Graph: an Extension to the Typed Access Matrix Model , 1994, ESORICS.
[15] Carl Hewitt,et al. Description and Theoretical Analysis (Using Schemata) of Planner: A Language for Proving Theorems and Manipulating Models in a Robot , 1972 .
[16] C. R. Ramakrishnan,et al. Model-Based Analysis of Configuration Vulnerabilities , 2002, J. Comput. Secur..
[17] Mohammad Mahdi Jaghoori,et al. Modere: the model-checking engine of Rebeca , 2006, SAC.
[18] Rasool Jalili,et al. Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG) , 2005, ICICS.
[19] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[20] R. Jalili,et al. Using CSP to model and analyze Transmission Control Protocol vulnerabilities within the broadcast network , 2004, 2004 International Networking and Communication Conference.
[21] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[22] Peter Y. A. Ryan,et al. The modelling and analysis of security protocols: the csp approach , 2000 .
[23] Rasool Jalili,et al. Modeling TCP/IP Networks Topology for Network Vulnerability Analysis , 2005 .
[24] Mohammad Mahdi Jaghoori,et al. Model Checking in Rebeca , 2003, PDPTA.