NetSPA : a Network Security Planning Architecture
暂无分享,去创建一个
[1] Richard Lippmann,et al. The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection , 2002, RAID.
[2] C. R. Ramakrishnan,et al. Model-Based Analysis of Configuration Vulnerabilities , 2002, J. Comput. Secur..
[3] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[5] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[6] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[8] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[9] R. Power. CSI/FBI computer crime and security survey , 2001 .
[10] Steven T. Eckmann. Translating Snort rules to STATL scenarios , 2001 .
[11] Frédéric Cuppens,et al. LAMBDA: A Language to Model a Database for Detection of Attacks , 2000, Recent Advances in Intrusion Detection.
[12] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[13] Giovanni Vigna,et al. The STAT tool suite , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[14] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[15] Fausto Giunchiglia,et al. NUSMV: A New Symbolic Model Verifier , 1999, CAV.
[16] Eugene H. Spafford,et al. Computer Vulnerability Analysis , 1998 .
[17] Karl N. Levitt,et al. NetKuang - A Multi-Host Configuration Vulnerability Checker , 1996, USENIX Security Symposium.
[18] Sérgio Vale Aguiar Campos,et al. Symbolic Model Checking , 1993, CAV.