http://www.tenable.com/products/nessus. Last visited on, 2011. ,
the OVAL Interpreter Reference Implementation. http://oval. mitre.org/language/interpreter.html. Last visited on, 2011. ,
Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, p.217, 2002. ,
DOI : 10.1145/586110.586140
The Technical Specification for the Security Content Automation Protocol (SCAP) NIST Special Publication, 2009. ,
Supporting Vulnerability Awareness in Autonomic Networks and Systems with OVAL, Proceeding of the 7th IEEE International Conference on Network and Service Management (CNSM'11), 2011. ,
Towards machine-assisted formal procedures for the collection of digital evidence, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.32-35, 2011. ,
DOI : 10.1109/PST.2011.5971960
Network Patterns in Cfengine and Scalable Data Aggregation, Proceedings of the 21st conference on Large Installation System Administration Conference, pp.1-22, 2007. ,
Dynamic Dependencies and Performance Improvement, Proceedings of the 22nd conference on Large Installation System Administration Conference, pp.9-21, 2008. ,
Predicting Labor Cost through IT Management Complexity Metrics, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.274-283, 2007. ,
DOI : 10.1109/INM.2007.374792
Vulnerability Management, 2010. ,
DOI : 10.1201/9781439801512
The vision of autonomic computing, Computer, vol.36, issue.1, pp.41-50, 2003. ,
DOI : 10.1109/MC.2003.1160055
A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.336-345, 2006. ,
DOI : 10.1145/1180405.1180446
ACML: Capability Based Attack Modeling Language, 2008 The Fourth International Conference on Information Assurance and Security, pp.147-154, 2008. ,
DOI : 10.1109/IAS.2008.26
A requires/provides model for computer attacks, Proceedings of the 2000 workshop on New security paradigms , NSPW '00, pp.31-38, 2000. ,
DOI : 10.1145/366173.366187
OVM, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, pp.1-34, 2009. ,
DOI : 10.1145/1558607.1558646
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.57-66, 2007. ,
DOI : 10.1145/1326304.1326314
Specification for the Extensible Configuration Checklist Description Format (XCCDF) http://scap.nist.gov/ specifications, 2011. ,