A new perspective of network vulnerability analysis using Network Security Gradient
暂无分享,去创建一个
Jie Liu | Yongjun Wang | Yonglin Sun | Xin Hu | Zhanrui Ren
[1] Cynthia A. Phillips,et al. Computer-attack graph generation tool , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[2] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[3] Jinshu Su,et al. Two Scalable Approaches to Analyzing Network Security Using Compact Attack Graphs , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[4] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[5] James P. McDermott,et al. Attack net penetration testing , 2001, NSPW '00.
[6] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[7] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[8] Sushil Jajodia,et al. Minimum-cost network hardening using attack graphs , 2006, Comput. Commun..
[9] Xia Wang,et al. Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems , 2007, Int. J. Inf. Comput. Secur..
[10] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[11] Jeannette M. Wing,et al. Scenario graphs and attack graphs , 2004 .
[12] Robert K. Cunningham,et al. Evaluating and Strengthening Enterprise Network Security Using Attack Graphs , 2005 .
[13] John Homer. From Attack Graphs to Automated Configuration Management — An Iterative Approach , 2008 .
[14] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[15] Somak Bhattacharya,et al. An Attack Graph Based Risk Management Approach of an Enterprise LAN , 2008 .
[16] Zhang Lufeng,et al. Network Security Evaluation through Attack Graph Generation , .
[17] Gary Carpenter. 동적 사용자를 위한 Scalable 인증 그룹 키 교환 프로토콜 , 2005 .
[18] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[19] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[20] Jinshu Su,et al. An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs , 2008, 2008 The Fourth International Conference on Information Assurance and Security.