A scalable approach to attack graph generation
暂无分享,去创建一个
[1] David Scott Warren,et al. Programming in Tabled Prolog , 1995 .
[2] Juliana Freire,et al. XSB: A System for Effciently Computing WFS , 1997, LPNMR.
[3] D. Warren,et al. Xsb -a System for Eeciently Computing Well Founded Semantics , 1997 .
[4] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[5] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[6] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[8] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[9] Giridhar Pemmasani,et al. Online Justification for Tabled Logic Programs , 2003, FLOPS.
[10] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[11] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[12] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[13] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[14] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[15] T. Tidwell,et al. Modeling Internet Attacks , 2022 .