Assessing the risk of complex ICT systems
暂无分享,去创建一个
Ali Ridha Mahjoub | Nizar Kheir | Nancy Perrot | M. Yassine Naghmouchi | Jean-Philippe Wary | Jean-Philippe Wary | A. Mahjoub | Nizar Kheir | N. Perrot | M. Naghmouchi | M. Y. Naghmouchi
[1] Alexander Schrijver,et al. Combinatorial optimization. Polyhedra and efficiency. , 2003 .
[2] Kim-Kwang Raymond Choo,et al. Security, Privacy, and Anonymity in Computation, Communication, and Storage , 2017, Lecture Notes in Computer Science.
[3] Ali Ridha Mahjoub,et al. A Bilevel Programming Model for Proactive Countermeasure Selection in Complex ICT Systems , 2018, Electron. Notes Discret. Math..
[4] Sajjan G. Shiva,et al. Use of Attack Graphs in Security Systems , 2014, J. Comput. Networks Commun..
[5] Christopher J. Alberts,et al. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0 , 1999 .
[6] Phongphun Kijsanayothin,et al. Analytical Approach to Attack Graph Analysis for Network Security , 2010, 2010 International Conference on Availability, Reliability and Security.
[7] David A. Schmidt,et al. Aggregating vulnerability metrics in enterprise networks using attack graphs , 2013, J. Comput. Secur..
[8] George B. Dantzig,et al. Linear programming and extensions , 1965 .
[9] John S. Baras,et al. Path Problems in Networks , 2010, Path Problems in Networks.
[10] Jin B. Hong,et al. HARMs: Hierarchical Attack Representation Models for Network Security Analysis , 2012, AISM 2012.
[11] Grant Purdy,et al. ISO 31000:2009—Setting a New Standard for Risk Management , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[12] Gabriel Jakobson,et al. Mission cyber security situation assessment using impact dependency graphs , 2011, 14th International Conference on Information Fusion.
[13] Atul Prakash,et al. Distilling critical attack graph surface iteratively through minimum-cost SAT solving , 2011, ACSAC '11.
[14] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[15] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[16] Youki Kadobayashi,et al. Exploring attack graph for cost-benefit security hardening: A probabilistic approach , 2013, Comput. Secur..
[17] Wei Huang,et al. Toward optimal multi-objective models of network security: Survey , 2011, The 17th International Conference on Automation and Computing.
[18] Nora Cuppens-Boulahia,et al. A Service Dependency Model for Cost-Sensitive Intrusion Response , 2010, ESORICS.
[19] Johan van Benthem,et al. Logical Dynamics of Information and Interaction , 2014 .
[20] Andrei V. Gurtov,et al. Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[21] Nora Cuppens-Boulahia,et al. Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks , 2013, CSS.
[22] Nizar Kheir,et al. A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems , 2016, MIST@CCS.
[23] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[24] Edmund M. Clarke,et al. Ranking Attack Graphs , 2006, RAID.
[25] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[26] Jeannette M. Wing. CHAPTER 9 – Scenario Graphs Applied to Network Security , 2008 .
[27] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.