Mean privacy: A metric for security of computer systems
暂无分享,去创建一个
[1] William H. Sanders,et al. Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[2] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[3] Tomas Olovsson,et al. A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..
[4] Jeanne H. Espedalen. Attack Trees Describing Security in Distributed Internet-Enabled Metrology , 2007 .
[5] Artur Hecker,et al. On the Operational Security Assurance Evaluation of Networked IT Systems , 2009, NEW2AN.
[6] Miles A. McQueen,et al. Ideal Based Cyber Security Technical Metrics for Control Systems , 2007, CRITIS.
[7] Mohammad Abdollahi Azgomi,et al. A game theoretic framework for evaluation of the impacts of hackers diversity on security measures , 2012, Reliab. Eng. Syst. Saf..
[8] N. Paulauskas,et al. Attacker Skill Level distribution estimation in the system mean time-to-compromise , 2008, 2008 1st International Conference on Information Technology.
[9] Ehab Al-Shaer,et al. A Novel Quantitative Approach For Measuring Network Security , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[11] Jeannette M. Wing,et al. A Formal Model for a System's Attack Surface , 2011, Moving Target Defense.
[12] Kishor S. Trivedi,et al. Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[13] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[14] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[15] Jan Willemson,et al. Computing Exact Outcomes of Multi-parameter Attack Trees , 2008, OTM Conferences.
[16] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[17] Miles A. McQueen,et al. Time-to-Compromise Model for Cyber Risk Reduction Estimation , 2006, Quality of Protection.
[18] Panagiotis Katsaros,et al. Probabilistic model checking for the quantification of DoS security threats , 2009, Comput. Secur..
[19] Jan Willemson,et al. On Fast and Approximate Attack Tree Computations , 2010, ISPEC.
[20] Marc Dacier,et al. Empirical analysis and statistical modeling of attack processes based on honeypots , 2007, ArXiv.
[21] William H. Sanders,et al. Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.
[22] Poorvi L. Vora,et al. An information-theoretic model of voting systems , 2008, Math. Comput. Model..
[23] Tamara Yu,et al. Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics , 2012 .
[24] David John Leversage,et al. Estimating a System's Mean Time-to-Compromise , 2008, IEEE Security & Privacy.
[25] Corrado Priami,et al. A Quantitative Study of Two Attacks , 2005, Electron. Notes Theor. Comput. Sci..
[26] Iliano Cervesato. Towards a Notion of Quantitative Security Analysis , 2006, Quality of Protection.
[27] William H. Sanders,et al. Model-based validation of an intrusion-tolerant information system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[28] Svein J. Knapskog,et al. On Stochastic Modeling for Integrated Security and Dependability Evaluation , 2006, J. Networks.