Measuring Intrusion Impacts for Rational Response: A State-based Approach
暂无分享,去创建一个
[1] Giovanni Vigna,et al. Using hidden markov models to evaluate the risks of intrusions : System architecture and model validation , 2006 .
[2] Salvatore J. Stolfo,et al. Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..
[3] Pin-Han Ho,et al. Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks , 2006, ICISC.
[4] John McHugh,et al. Intrusion and intrusion detection , 2001, International Journal of Information Security.
[5] Joost-Pieter Katoen,et al. Model checking Markov reward models with impulse rewards , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[6] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[7] O. Patrick Kreidl,et al. Feedback control applied to survivability: a host-based autonomic defense system , 2004, IEEE Transactions on Reliability.
[8] Hong Shen,et al. Constructing multi-layered boundary to defend against intrusive anomalies: an autonomic detection coordinator , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[9] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[10] D. Aberdeen,et al. A ( Revised ) Survey of Approximate Methods for Solving Partially Observable Markov Decision Processes , 2003 .
[11] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[12] Peng Ning,et al. Techniques and tools for analyzing intrusion alerts , 2004, TSEC.
[13] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.