Author:
Kotenko Igor,Stepashkin Mikhail
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Alberts, C., Dorofee, A.: Managing Information Security Risks: The OCTAVE Approach. Addison-Wesley, Reading (2002)
2. Chapman, C., Ward, S.: Project Risk Management: processes, techniques and insights. John Wiley, Chichester (2003)
3. CVSS. Common Vulnerability Scoring System,
http://www.first.org/cvss/
4. Dantu, R., Loper, K., Kolan, P.: Risk Management using Behavior based Attack Graphs. In: International Conference on Information Technology: Coding and Computing (2004)
5. Hariri, S., Qu, G., Dharmagadda, T., Ramkishore, M., Raghavendra, C.S.: Impact Analysis of Faults and Attacks in Large-Scale Networks. IEEE Security&Privacy (September/October 2003)
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献