Towards Quantifying the (In)Security of Networked Systems
暂无分享,去创建一个
[1] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[2] Andrew A. Chien,et al. Tolerating denial-of-service attacks using overlay networks: impact of topology , 2003, SSRS '03.
[3] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM.
[4] Christos Faloutsos,et al. Epidemic spreading in real networks: an eigenvalue viewpoint , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[5] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Hung Q. Ngo,et al. Towards a theory of insider threat assessment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[7] Jeannette M. Wing. Survivability analysis of networked systems , 2000, FORTE.
[8] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[9] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[10] Alexander Grey,et al. The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .
[11] Donald F. Towsley,et al. The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[12] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[13] N. Bailey,et al. The mathematical theory of infectious diseases and its applications. 2nd edition. , 1975 .
[14] N. Ling. The Mathematical Theory of Infectious Diseases and its applications , 1978 .
[15] Marc Dacier,et al. Privilege Graph: an Extension to the Typed Access Matrix Model , 1994, ESORICS.
[16] Somesh Jha,et al. Survivability analysis of networked systems , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[17] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.