Implementing interactive analysis of attack graphs using relational databases
暂无分享,去创建一个
[1] Gary Carpenter. 동적 사용자를 위한 Scalable 인증 그룹 키 교환 프로토콜 , 2005 .
[2] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[3] Sushil Jajodia,et al. Data warehousing and data mining techniques for intrusion detection systems , 2006, Distributed and Parallel Databases.
[5] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[6] Anoop Singhal. Intrusion Detection Systems , 2007 .
[7] Sushil Jajodia. Topological analysis of network attack vulnerability , 2007, ASIACCS '07.
[8] Sushil Jajodia,et al. Correlating intrusion events and building attack scenarios through attack graph distances , 2004, 20th Annual Computer Security Applications Conference.
[9] Yi Zhang,et al. Two Formal Analysis of Attack Graphs: Two Formal Analysis of Attack Graphs , 2010 .
[10] Sushil Jajodia,et al. An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts , 2005, ESORICS.
[11] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[12] Sushil Jajodia,et al. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..
[13] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[14] Sushil Jajodia,et al. Interactive Analysis of Attack Graphs Using Relational Queries , 2006, DBSec.
[15] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[16] C. R. Ramakrishnan,et al. Model-Based Analysis of Configuration Vulnerabilities , 2002, J. Comput. Secur..
[17] Sushil Jajodia,et al. Data Mining for Intrusion Detection , 2005, Data Mining and Knowledge Discovery Handbook.
[18] Sushil Jajodia,et al. Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..
[19] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[20] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[21] Sushil Jajodia,et al. Measuring the Overall Security of Network Configurations Using Attack Graphs , 2007, DBSec.
[22] Ramakrishnan Srikant,et al. Implementing P3P using database technology , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[23] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.