Author:
Gonda Tom,Puzis Rami,Shapira Bracha
Publisher
Springer International Publishing
Reference25 articles.
1. Morrow, B.: Byod security challenges: control and protect your most sensitive data. Netw. Secur. 2012(12), 5–8 (2012)
2. Zhang, S., Zhang, X., Ou, X.: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 317–328. ACM (2014)
3. Shostack, A.: Quantifying patch management. Secure Bus. Q. 3(2), 1–4 (2003)
4. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 217–224. ACM (2002)
5. Sheyner, O.M.: Scenario graphs and attack graphs. Ph.D. thesis, US Air Force Research Laboratory (2004)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献