Automated generation and analysis of attack graphs
暂无分享,去创建一个
Somesh Jha | Richard Lippmann | Jeannette M. Wing | Oleg Sheyner | Joshua W. Haines | R. Lippmann | S. Jha | J. Haines | Oleg Sheyner
[1] C. M. Sperberg-McQueen,et al. Extensible markup language , 1997 .
[2] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[3] C. M. Sperberg-McQueen,et al. eXtensible Markup Language (XML) 1.0 (Second Edition) , 2000 .
[4] Fausto Giunchiglia,et al. NUSMV: a new symbolic model checker , 2000, International Journal on Software Tools for Technology Transfer.
[5] C. M. Sperberg-McQueen,et al. Extensible Markup Language (XML) , 1997, World Wide Web J..
[6] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[7] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[8] Stephan Merz,et al. Model Checking , 2000 .
[9] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[10] Somesh Jha,et al. Minimization and Reliability Analyses of Attack Graphs , 2002 .
[11] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[12] Martin L. Puterman,et al. Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .
[13] Frédéric Cuppens,et al. LAMBDA: A Language to Model a Database for Detection of Attacks , 2000, Recent Advances in Intrusion Detection.
[14] Randal E. Bryant,et al. Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.
[15] Jeannette M. Wing. Survivability analysis of networked systems , 2000, FORTE.
[16] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[17] Bruce Schneier,et al. MODELING SECURITY THREATS , 1999 .
[18] Somesh Jha,et al. Survivability analysis of networked systems , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[19] E. Clarke,et al. Symbolic Model Checking : IO * ’ States and Beyond * , 1992 .
[20] Edmund M. Clarke,et al. Symbolic Model Checking: 10^20 States and Beyond , 1990, Inf. Comput..
[21] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[22] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[23] Robert P. Kurshan,et al. Computer-Aided Verification of Coordinating Processes: The Automata-Theoretic Approach , 2014 .