Enterprise architecture models for cyber security analysis
暂无分享,去创建一个
[1] Mathias Ekstedt,et al. Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models , 2009 .
[2] Mathias Ekstedt,et al. Combining Defense Graphs and Enterprise Architecture Models for Security Analysis , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.
[3] Finn V. Jensen,et al. Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.
[4] Robert Lagerström,et al. Enterprise architecture analysis with extended influence diagrams , 2007, Inf. Syst. Frontiers.
[5] Marianne M. Swanson,et al. Recommended Security Controls for Federal Information Systems , 2005 .
[6] Ronald A. Howard,et al. Influence Diagrams , 2005, Decis. Anal..
[7] Ida Hogganvik,et al. A Graphical Approach to Security Risk Analysis , 2007 .
[8] Christopher J. Alberts,et al. Managing Information Security Risks: The OCTAVE Approach , 2002 .
[9] John A. Zachman,et al. A Framework for Information Systems Architecture , 1987, IBM Syst. J..
[10] Richard E. Neapolitan,et al. Learning Bayesian networks , 2007, KDD '07.
[11] Stefano Bistarelli,et al. Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[12] Erik Johansson,et al. A Tool for Enterprise Architecture Analysis , 2007, 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007).
[13] Michael D. Smith,et al. Computer security strength and risk: a quantitative approach , 2004 .
[14] Ross D. Shachter. Probabilistic Inference and Influence Diagrams , 1988, Oper. Res..
[15] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2000, Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000.
[16] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[17] D. Dolezilek,et al. Communications Technologies and Practices to Satisfy NERC Critical Infrastructure Protection (CIP) , 2006, 2006 Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources.
[18] Ruth Breu,et al. Quantitative Assessment of Enterprise Security System , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[19] Ross D. Shachter. Evaluating Influence Diagrams , 1986, Oper. Res..
[20] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[21] Wenke Lee,et al. Attack plan recognition and prediction using causal networks , 2004, 20th Annual Computer Security Applications Conference.
[22] Yu Liu,et al. Network vulnerability assessment using Bayesian networks , 2005, SPIE Defense + Commercial Sensing.