A weakest-adversary security metric for network configuration security analysis
- 30 October 2006
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- A Host-Based Approach to Network Attack Chaining AnalysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Rule-Based Topological Vulnerability AnalysisLecture Notes in Computer Science, 2005
- Tools for Generating and Analyzing Attack GraphsLecture Notes in Computer Science, 2004
- Scalable, graph-based network vulnerability analysisPublished by Association for Computing Machinery (ACM) ,2002
- Computer-attack graph generation toolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Experimenting with quantitative evaluation tools for monitoring operational securityIEEE Transactions on Software Engineering, 1999
- A graph-based system for network-vulnerability analysisPublished by Association for Computing Machinery (ACM) ,1998