Measuring the Overall Security of Network Configurations Using Attack Graphs
- 1 January 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Minimum-cost network hardening using attack graphsComputer Communications, 2006
- A weakest-adversary security metric for network configuration security analysisPublished by Association for Computing Machinery (ACM) ,2006
- Using attack graphs for correlating, hypothesizing, and predicting intrusion alertsComputer Communications, 2006
- Interactive Analysis of Attack Graphs Using Relational QueriesLecture Notes in Computer Science, 2006
- Ranking Attack GraphsLecture Notes in Computer Science, 2006
- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion AlertsLecture Notes in Computer Science, 2005
- GSM SecurityNetwork Security, 2004
- Authentication metric analysis and designACM Transactions on Information and System Security, 1999
- Experimenting with quantitative evaluation tools for monitoring operational securityIEEE Transactions on Software Engineering, 1999
- A graph-based system for network-vulnerability analysisPublished by Association for Computing Machinery (ACM) ,1998