Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics
暂无分享,去创建一个
[1] Miles A. McQueen,et al. Ideal Based Cyber Security Technical Metrics for Control Systems , 2007, CRITIS.
[2] Paul Love,et al. Visible Ops Security: Achieving Common Security and it Operations Objectives in Four Practical Steps , 2008 .
[3] Danny Dhillon,et al. Developer-Driven Threat Modeling: Lessons Learned in the Trenches , 2011, IEEE Security & Privacy.
[4] Ravi Kumar,et al. A characterization of online browsing behavior , 2010, WWW '10.
[5] Wenke Lee,et al. Modeling Botnet Propagation Using Time Zones , 2006, NDSS.
[6] Gregory S. Parnell,et al. Mission Oriented Risk and Design Analysis of Critical Information Systems , 2005 .
[7] Darryl Veitch,et al. Capturing the Elusive Poissonity in Web Traffic , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.
[8] Richard Lippmann,et al. Modeling Modern Network Attacks and Countermeasures Using Attack Graphs , 2009, 2009 Annual Computer Security Applications Conference.
[9] Anja Feldmann,et al. An Assessment of Overt Malicious Activity Manifest in Residential Networks , 2011, DIMVA.
[10] Salvatore J. Stolfo,et al. Measuring Security , 2011, IEEE Security & Privacy.
[11] V. Rich. Personal communication , 1989, Nature.
[12] Karen A. Scarfone,et al. Common Platform Enumeration: Applicability Language Specification Version 2.3 , 2011 .
[13] F. Osinga. Science, Strategy and War: The Strategic Theory of John Boyd , 2006 .
[14] David Vere-Jones,et al. Point Processes , 2011, International Encyclopedia of Statistical Science.
[15] David Levin. Lessons learned in using live red teams in IA experiments , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[16] Karen A. Scarfone,et al. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 , 2010 .
[17] Paul Barford,et al. Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.
[18] R. Kimball. Failure in Risk Management , 2000 .
[19] Robert A. Martin. Managing Vulnerabilities in Networked Systems , 2001, Computer.
[20] Gloria J. Serrao. Network access control (NAC): An open source analysis of architectures and requirements , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[21] A. Sayigh,et al. This page was intentionally left blank , 2014, Electrical Overstress/Electrostatic Discharge Symposium Proceedings 2014.
[22] Harold Booth,et al. CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Architecture (Draft) , 1969 .
[23] Karen A. Scarfone,et al. The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities , 2010 .
[24] Kelley L. Dempsey,et al. Information Security Continuous Monitoring for Federal Information Systems and Organizations , 2011 .
[25] Andrew Jaquith. Security Metrics: Replacing Fear, Uncertainty, and Doubt , 2007 .
[26] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[27] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.