Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis
暂无分享,去创建一个
Kristian Beckers | Maritta Heisel | Fabio Martinelli | Rene Meis | Artsiom Yautsiukhin | Leanid Krautsevich
[1] Carlos Sarraute,et al. An algorithm to find optimal attack paths in nondeterministic scenarios , 2011, AISec '11.
[2] Fabio Massacci,et al. A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach , 2011, FOSAD.
[3] Zbigniew W. Ras,et al. Advances in Intelligent Information Systems , 2010, Advances in Intelligent Information Systems.
[4] R.F. Mills,et al. Analyzing Attack Trees using Generalized Stochastic Petri Nets , 2006, 2006 IEEE Information Assurance Workshop.
[5] A Min Tjoa,et al. SOFSEM 2014: Theory and Practice of Computer Science , 2014, Lecture Notes in Computer Science.
[6] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[7] Haralambos Mouratidis,et al. Using Security Attack Scenarios to Analyse Security During Information Systems Design , 2004, ICEIS.
[8] Wenke Lee,et al. Attack plan recognition and prediction using causal networks , 2004, 20th Annual Computer Security Applications Conference.
[9] Stefano Bistarelli,et al. Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[10] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[11] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[12] William H. Sanders,et al. Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.
[13] Roberto Gorrieri,et al. Foundations of Security Analysis and Design VII , 2014, Lecture Notes in Computer Science.
[14] Seungjoo Kim,et al. Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.
[15] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[16] John Mylopoulos,et al. Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology , 2010, Advances in Intelligent Information Systems.
[17] Kristian Beckers. Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001 , 2014, SOFSEM.
[18] Bruce Schneier,et al. MODELING SECURITY THREATS , 1999 .
[19] Kristian Beckers,et al. Common criteria compliant software development (CC-CASD) , 2013, SAC '13.
[20] Jan Jürjens. Using UMLsec and goal trees for secure systems development , 2002, SAC '02.
[21] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[22] Fabio Martinelli,et al. Towards Modelling Adaptive Attacker's Behaviour , 2012, FPS.
[23] Ludovic Piètre-Cambacédès,et al. Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP) , 2010, 2010 European Dependable Computing Conference.