Security metrics have received significant attention. However, they have not been systematically explored based on the understanding of attack-defense interactions, which …
A Avizienis, JC Laprie, B Randell… - IEEE transactions on …, 2004 - ieeexplore.ieee.org
This paper gives the main definitions relating to dependability, a generic concept including a special case of such attributes as reliability, availability, safety, integrity, maintainability, etc …
Cyber insurance is a rapidly developing area which draws more and more attention of practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …
O Sheyner, J Haines, S Jha… - … IEEE Symposium on …, 2002 - ieeexplore.ieee.org
An integral part of modeling the global view of network security is constructing attack graphs. Manual attack graph construction is tedious, error-prone, and impractical for attack graphs …
P Ammann, D Wijesekera, S Kaushik - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Even well administered networks are vulnerable to attack. Recent work in network security has focused on the fact that combinations of exploits are the typical means by which an …
PK Manadhata, JM Wing - IEEE Transactions on Software …, 2010 - ieeexplore.ieee.org
Measurement of software security is a long-standing challenge to the research community. At the same time, practical security metrics and measurements are essential for secure …
S Jha, O Sheyner, J Wing - Proceedings 15th IEEE Computer …, 2002 - ieeexplore.ieee.org
An attack graph is a succinct representation of all paths through a system that end in a state where an intruder has successfully achieved his goal. Today Red Teams determine the …