Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Noel S, Jajodia S, O’Berry B, Jacobs M (2003) Efficient minimum-cost network hardening via exploit dependency graph. In: Proceedings of 19th annual computer security applications conference (ACSAC 2003), Las Vegas, Nevada, pp 86–95
2. Phillips C, Swiler LP (1998) A graph-based system for network-vulnerability analysis. In: Proceedings of the workshop on new security paradigms (NSPW), Virginia, USA, pp 71–79
3. Tidwell T, Larson R, Fitch K, Hale J (2001) Modelling internet attacks. In: Proceedings of the second annual IEEE SMC information assurance workshop, United States Military Academy, West Point, New York. IEEE Press, New York, pp 54–59
4. Dawkins J, Hale J (2004) A systematic approach to multi-stage network attack analysis. In: Proceedings of the second IEEE internation information assurance workshop (IWIA ’04), IEEE Computer Society, Washington, pp 48–56
5. Ortalo R, Deswarte Y, Kanniche M (1999) Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans Soft Eng 25(5):633–650
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献