Practical Attack Graph Generation for Network Defense
暂无分享,去创建一个
[1] Miss A.O. Penney. (b) , 1974, The New Yale Book of Quotations.
[2] Randal E. Bryant,et al. Graph-Based Algorithms for Boolean Function Manipulation , 1986, IEEE Transactions on Computers.
[3] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Frédéric Cuppens,et al. LAMBDA: A Language to Model a Database for Detection of Attacks , 2000, Recent Advances in Intrusion Detection.
[5] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[6] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[7] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[8] Michael Lyle Artz,et al. NetSPA : a Network Security Planning Architecture , 2002 .
[9] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[10] Steven Noel,et al. Representing TCP/IP connectivity for topological analysis of network security , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[11] Ulf Lindqvist,et al. Modeling multistep cyber attacks for scenario recognition , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[12] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[13] Peng Ning,et al. Learning attack strategies from intrusion alerts , 2003, CCS '03.
[14] George Cybenko,et al. Quantitative risk analysis of computer networks , 2003 .
[15] Sushil Jajodia,et al. Managing attack graph complexity through visual hierarchical aggregation , 2004, VizSEC/DMSEC '04.
[16] Avishai Wool,et al. A quantitative study of firewall configuration errors , 2004, Computer.
[17] Paul Ammann,et al. A host-based approach to network attack chaining analysis , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[18] Sushil Jajodia,et al. Understanding complex network attack graphs through clustered adjacency matrices , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[19] Robert K. Cunningham,et al. Evaluating and Strengthening Enterprise Network Security Using Attack Graphs , 2005 .
[20] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[21] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[22] R. Cunningham,et al. Validating and Restoring Defense in Depth Using Attack Graphs , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[23] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[24] Stuart E. Schechter,et al. Inoculating SSH Against Address Harvesting , 2006, NDSS.
[25] Chen-Nee Chuah,et al. FIREMAN: a toolkit for firewall modeling and analysis , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[26] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.