[HTML][HTML] An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity

N Naik, P Grace, P Jenkins, K Naik, J Song - Computers & Security, 2022 - Elsevier
Abstract Self-Sovereign Identity (SSI) empowers users to govern their digital identity and
personal data. This approach has changed the identity paradigm where users become the …

A weakest-adversary security metric for network configuration security analysis

J Pamula, S Jajodia, P Ammann… - Proceedings of the 2nd …, 2006 - dl.acm.org
A security metric measures or assesses the extent to which a system meets its security
objectives. Since meaningful quantitative security metrics are largely unavailable, the …

ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment

B Foo, YS Wu, YC Mao, S Bagchi… - … Systems and Networks …, 2005 - ieeexplore.ieee.org
Distributed systems with multiple interacting services, especially e-commerce systems, are
suitable targets for malicious attacks because of the potential financial impact. Compared to …

Quantitative vulnerability assessment of systems software

OH Alhazmi, YK Malaiya - Annual Reliability and …, 2005 - ieeexplore.ieee.org
This paper addresses feasibility of vulnerabilities present in the software. Vulnerabilities
present in such software represent significant security risks. For Windows 98 and Windows …

Measuring the overall security of network configurations using attack graphs

L Wang, A Singhal, S Jajodia - IFIP annual conference on data and …, 2007 - Springer
Today's computer systems face sophisticated intrusions during which multiple vulnerabilities
can be combined for reaching an attack goal. The overall security of a network system …

Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS

YS Wu, B Foo, Y Mei, S Bagchi - 19th Annual Computer …, 2003 - ieeexplore.ieee.org
We present the design and implementation of a collaborative intrusion detection system
(CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs …

Toward measuring network security using attack graphs

L Wang, A Singhal, S Jajodia - Proceedings of the 2007 ACM workshop …, 2007 - dl.acm.org
In measuring the overall security of a network, a crucial issue is to correctly compose the
measure of individual components. Incorrect compositions may lead to misleading results …

Method and tool for network vulnerability analysis

LP Swiler, CA Phillips - US Patent 7,013,395, 2006 - Google Patents
(57) ABSTRACT A computer System analysis tool and method that will allow for qualitative
and quantitative assessment of Security attributes and Vulnerabilities in Systems including …

A service dependency model for cost-sensitive intrusion response

N Kheir, N Cuppens-Boulahia, F Cuppens… - … Security–ESORICS 2010 …, 2010 - Springer
Recent advances in intrusion detection and prevention have brought promising solutions to
enhance IT security. Despite these efforts, the battle with cyber attackers has reached a …

[引用][C] 网络安全的随机模型方法与评价技术

林闯, 汪洋, 李泉林 - 计算机学报, 2005