Author:
Butts Jonathan W.,Mills Robert F.,Baldwin Rusty O.
Publisher
Springer Berlin Heidelberg
Reference8 articles.
1. Anderson, R., Bozek, T., Longstaff, T., Meitzler, W., Skroch, M., Van Wyk, K.: Research on Mitigating the Insider Threat to Information Systems. In: Proceedings of the Insider Workshop. CF-163-DARPA. Arlington, VA (2000)
2. Chinchani, R., Iyer, A., Ngo, H., Upadhyaya, S.: Towards a Theory of Insider Threat Assessment. In: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, June 28–July 01 (2005)
3. Daley, K., Larson, R., Dawkins, J.: A Structural Framework for Modeling Multi-Stage Network Attacks. In: Proceedings of the IEEE International Conference on Parallel Processing Workshops, pp. 5–10 (2002)
4. Jha, S., Sheyner, O., Wing, J.: Two Formal Analyses of Attack Graphs. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop, p. 49 (2002)
5. Phillips, C., Swiler, L.: A Graph-Based system for network vulnerability analysis. In: ACM New Security Paradigms Workshop, pp. 71–79 (1998)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献