A Kolmogorov Complexity Approach for Measuring Attack Path Complexity
暂无分享,去创建一个
[1] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[2] Stephen F. Bush,et al. Information assurance through Kolmogorov complexity , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[3] Mattia Monga,et al. Assessing the risk of using vulnerable components , 2006, Quality of Protection.
[4] Sushil Jajodia,et al. Measuring the Overall Security of Network Configurations Using Attack Graphs , 2007, DBSec.
[5] R. Cunningham,et al. Validating and Restoring Defense in Depth Using Attack Graphs , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[6] Rayford B. Vaughn,et al. Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).
[7] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[8] Philip K. Chan,et al. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , 2004, CCS 2004.
[9] Dirk Fox. Computer Emergency Response Team (CERT) , 2002, Datenschutz und Datensicherheit.
[10] Gail-Joon Ahn,et al. Data and Applications Security XXI , 2007 .
[11] Lawrence V. Saxton,et al. Filtering Spam Using Kolmogorov Complexity Estimates , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[12] Marc Dacier,et al. Models and tools for quantitative assessment of operational security , 1996, SEC.
[13] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[14] Ming Li,et al. An Introduction to Kolmogorov Complexity and Its Applications , 2019, Texts in Computer Science.
[15] Ram Dantu,et al. Risk Management Using Behavior Based Bayesian Networks , 2005, ISI.
[16] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.