HS Lallie, K Debattista, J Bal - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely recognized and welldocumented, and more effective techniques are needed to aid cyber …
MS Barik, A Sengupta, C Mazumdar - Defence science journal, 2016 - core.ac.uk
As computer networks are emerging in everyday life, network security has become an important issue. Simultaneously, attacks are becoming more sophisticated, making the …
V Shandilya, CB Simmons… - Journal of Computer …, 2014 - Wiley Online Library
Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject …
L Williams, R Lippmann, K Ingols - Visualization for Computer Security: 5th …, 2008 - Springer
Attack graphs enable computation of important network security metrics by revealing potential attack paths an adversary could use to gain control of network assets. This paper …
RE Sawilla, X Ou - Computer Security-ESORICS 2008: 13th European …, 2008 - Springer
Attack graphs have been proposed as useful tools for analyzing security vulnerabilities in network systems. Even when they are produced efficiently, the size and complexity of attack …
J Homer, A Varikuti, X Ou, MA McQueen - Visualization for Computer …, 2008 - Springer
Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are …
L Williams, R Lippmann, K Ingols - … 2007: Proceedings of the Workshop on …, 2008 - Springer
Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current attack graph …
B Kordy, S Mauw, S Radomirović… - Journal of Logic and …, 2014 - academic.oup.com
Attack–defense trees are a novel methodology for graphical security modelling and assessment. They extend the well-known formalism of attack trees by allowing nodes that …
K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target network. They can be used in determining both proactive and reactive security measures …