Author:
Almasizadeh Jaafar,Azgomi Mohammad Abdollahi
Subject
Computer Networks and Communications
Reference43 articles.
1. Model-based evaluation: from dependability to security;Nicol;IEEE Transactions on Dependable and Secure Computing,2004
2. A method for modeling and quantifying the security attributes of intrusion tolerant systems;Madan;Performance Evaluation Journal,2004
3. D.J. Leversage, E. James, Estimating a System’s Mean Time-to-Compromise, Security & Privacy, IEEE March 16–19, IEEE CS Press, 2008, pp. 52–60.
4. E. LeMay, M.D. Ford, K. Keefe, W.H. Sanders, C. Muehrcke, Model-based security metrics using ADversary View security evaluation (ADVISE), in: Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems (QEST 2011), Aachen, Germany, September 5–8, 2011.
5. Cryptography and Network Security: Principles and Practice;Stallings,2011
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献