Dynamic Security Risk Management Using Bayesian Attack Graphs
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs , 2008, Journal of Network and Systems Management.
[2] Eugene Santos,et al. Exploiting case-based independence for approximating marginal probabilities , 1996, Int. J. Approx. Reason..
[3] Shawn A. Butler. Security attribute evaluation method: a cost-benefit approach , 2002, ICSE '02.
[4] Enrique Alba,et al. Parallelism and evolutionary algorithms , 2002, IEEE Trans. Evol. Comput..
[5] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[6] Ram Dantu,et al. Risk management using behavior based attack graphs , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[7] Aravind Seshadri,et al. A FAST ELITIST MULTIOBJECTIVE GENETIC ALGORITHM: NSGA-II , 2000 .
[8] Coniferous softwood. GENERAL TERMS , 2003 .
[9] Lingyu Wang,et al. Measuring Network Security Using Bayesian Network-Based Attack Graphs , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.
[10] Paul Fischbeck,et al. Multi-attribute risk assessment , 2002 .
[11] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[12] Sushil Jajodia,et al. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..
[13] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[14] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[15] Sushil Jajodia,et al. Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..
[16] Indrajit Ray,et al. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders , 2005, ESORICS.
[17] Brett Berger,et al. Data-Centric Quantitative Computer Security Risk Assessment , 2003 .
[18] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[19] Indrajit Ray,et al. Optimal security hardening using multi-objective optimization on attack tree models of networks , 2007, CCS '07.
[20] S. Radack. The Common Vulnerability Scoring System (CVSS) , 2007 .
[21] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[22] Yi Zhang,et al. Two Formal Analysis of Attack Graphs: Two Formal Analysis of Attack Graphs , 2010 .
[23] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[24] Salvatore J. Stolfo,et al. Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..
[25] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[26] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[27] Yu Liu,et al. Network vulnerability assessment using Bayesian networks , 2005, SPIE Defense + Commercial Sensing.
[28] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[29] Ram Dantu,et al. Network risk management using attacker profiling , 2009, Secur. Commun. Networks.
[30] Sushil Jajodia,et al. Measuring network security using dynamic bayesian network , 2008, QoP '08.
[31] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[32] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[33] Rahul Telang,et al. Measuring the risk-based value of IT security solutions , 2004, IT Professional.
[34] Peng Liu,et al. Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[35] Sushil Jajodia,et al. Measuring the Overall Security of Network Configurations Using Attack Graphs , 2007, DBSec.
[36] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[37] Ram Dantu,et al. Classification of Attributes and Behavior in Risk Management Using Bayesian Networks , 2007, 2007 IEEE Intelligence and Security Informatics.
[38] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[39] Diptikalyan Saha,et al. Extending logical attack graphs for efficient vulnerability analysis , 2008, CCS.