Author:
Keefe Ken,Feddersen Brett,Rausch Michael,Wright Ronald,Sanders William H.
Publisher
Springer International Publishing
Reference27 articles.
1. Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: from dependability to security. IEEE Trans. Dependable Secure Comput. 1(1), 48–65 (2004)
2. Jajodia, S., Noel, S., O’Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats: Issues, Approaches, and Challenges, pp. 247–266. Springer, Boston (2005). https://doi.org/10.1007/0-387-24230-9_9
3. Ortalo, R., Deswarte, Y., Kaâniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Softw. Eng. 25(5), 633–650 (1999)
4. LeMay, E.: Adversary-driven state-based system security evaluation. Ph.D. dissertation, University of Illinois at Urbana-Champaign, Urbana, Illinois (2011)
5. Clark, G., T. et al.: The Möbius modeling tool. In: Proceedings of the 9th International Workshop on Petri Nets and Performance Models, pp. 241–250, September 2001
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献