Toward hybrid attack dependency graphs
暂无分享,去创建一个
[1] J.G. Tront,et al. Battery-Sensing Intrusion Protection System , 2006, 2006 IEEE Information Assurance Workshop.
[2] John Hale,et al. On Modeling Computer Networks for Vulnerability Analysis , 2002, DBSec.
[3] Thomas A. Henzinger,et al. Hybrid Automata: An Algorithmic Approach to the Specification and Verification of Hybrid Systems , 1992, Hybrid Systems.
[4] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[5] Kun Chen,et al. A Radiofrequency Identification (RFID) Temperature-Monitoring System for Extended Maintenance of Nuclear Materials Packaging , 2009 .
[6] Report: Cyber-physical Systems Summit , .
[7] M. Brownfield,et al. Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[8] Edward A. Lee. Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .
[9] A. Buttner,et al. Common Platform Enumeration (CPE) - Specification , 2011 .
[10] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[11] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[12] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[13] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[14] Scott F. Midkiff,et al. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.
[15] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.