K Ingols, R Lippmann… - 2006 22nd Annual …, 2006 - ieeexplore.ieee.org
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patching the …
C Sarraute, O Buffet, J Hoffmann - arXiv preprint arXiv:1306.4714, 2013 - arxiv.org
Penetration Testing is a methodology for assessing network security, by generating and executing possible attacks. Doing so automatically allows for regular and systematic testing …
A Gehani, G Kedem - Recent Advances in Intrusion Detection: 7th …, 2004 - Springer
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system and …
M Alhomidi, M Reed - International Journal of Network Security & Its …, 2014 - Citeseer
Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions …
M Alhomidi, M Reed - World Congress on Internet Security …, 2013 - ieeexplore.ieee.org
Attack graphs are models that offer significant capabilities to analyse security in network systems because they can represent vulnerabilities, exploits and conditions for each attack …
C Sarraute - arXiv preprint arXiv:1307.7808, 2013 - arxiv.org
Penetration Testing is a methodology for assessing network security, by generating and executing possible attacks. Doing so automatically allows for regular and systematic testing …
Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In …
HL Vu, KK Khaw, TY Chen - The Computer Journal, 2015 - academic.oup.com
Despite a significant increase in security of modern information systems, cyber attacks have become more sophisticated as attackers combine multiple vulnerabilities to penetrate …
M Niitsoo - International Workshop on Security, 2010 - Springer
Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the expected …