Mission-Centric Cyber Security Assessment of Critical Systems
暂无分享,去创建一个
[1] William H. Sanders,et al. RRE: A Game-Theoretic Intrusion Response and Recovery Engine , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Robert F. Mills,et al. Improving the cyber incident mission impact assessment (CIMIA) process , 2008, CSIIRW '08.
[3] Hasan Çam,et al. Mission-aware time-dependent cyber asset criticality and resilience , 2013, CSIIRW '13.
[4] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[5] Richard A. Raines,et al. A framework for analyzing and mitigating the vulnerabilities of complex systems via attack and protection trees , 2007 .
[6] Stefano Bistarelli,et al. Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[7] Zahid Anwar,et al. Automatic security assessment of critical cyber-infrastructures , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[8] Bryan Johnson,et al. Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering , 2015 .
[9] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[10] Leo Katz,et al. A new status index derived from sociometric analysis , 1953 .
[11] Dmitry Podkuiko,et al. Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.
[12] Sushil Jajodia,et al. Cauldron mission-centric cyber situational awareness with defense in depth , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[13] Robin A. Gandhi,et al. Semi-Automatic Annotation of Natural Language Vulnerability Reports , 2013, Int. J. Secur. Softw. Eng..
[14] B. D'Ambrosio,et al. Security Situation Assessment and Response Evaluation (SSARE) , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[15] Ludovic Piètre-Cambacédès,et al. Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP) , 2010, 2010 European Dependable Computing Conference.
[16] Mathias Ekstedt,et al. The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures , 2013, IEEE Systems Journal.
[17] Yalin E. Sagduyu,et al. Integrated situational awareness for cyber attack detection, analysis, and mitigation , 2012, Defense + Commercial Sensing.
[18] David L. Dill,et al. Applying a Reusable Election Threat Model at the County Level , 2011, EVT/WOTE.
[19] Mike Tanner,et al. A systems engineering approach for crown jewels estimation and mission assurance decision making , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[20] William H. Sanders,et al. Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.
[21] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[22] Ketil Stølen,et al. Model-based risk assessment to improve enterprise security , 2002, Proceedings. Sixth International Enterprise Distributed Object Computing.
[23] William H. Sanders,et al. Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.
[24] Dmitry Podkuiko,et al. Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.
[25] Ruth Breu,et al. Quantitative Assessment of Enterprise Security System , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[26] John R. Goodall,et al. Camus: Automatically mapping Cyber Assets to Missions and Users , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.