Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.217-224, 2002. ,
DOI : 10.1145/586110.586140
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.1162
Introduction to Algorithms, 2009. ,
Improving Attack Graph Visualization through Data Reduction and Attack Grouping, Proceedings of the Fifth International Workshop on Visualization for Cyber Security, pp.68-79, 2008. ,
DOI : 10.1007/978-3-540-85933-8_7
URL : http://cis.ksu.edu/~xou/publications/vizsec08.pdf
Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.121-130, 2006. ,
DOI : 10.1109/ACSAC.2006.39
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8029
Two formal analyses of attack graphs, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, p.49, 2002. ,
DOI : 10.1109/CSFW.2002.1021806
Mapping evidence graphs to attack graphs, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.121-126, 2012. ,
DOI : 10.1109/WIFS.2012.6412636
Ranking Attack Graphs, Proceedings of the Ninth International Conference on Recent Advances in Intrusion Detection, pp.127-144, 2006. ,
DOI : 10.1007/11856214_7
A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.336-345, 2006. ,
DOI : 10.1145/1180405.1180446
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.1616
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002. ,
DOI : 10.1109/SECPRI.2002.1004377
Security Risk Analysis of Enterprise Networks using Probabilistic Attack Graphs, NIST Interagency Report National Institute of Standards and Technology, vol.7788, 2011. ,
DOI : 10.6028/NIST.IR.7788
An Attack Graph-Based Probabilistic Security Metric, Proceedings of the Twenty-Second Annual IFIP WG 11.3 Conference on Data and Applications Security, pp.283-296, 2008. ,
DOI : 10.1016/j.comcom.2006.06.018
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.465.9269
A Graph Based Approach Toward Network Forensics Analysis, ACM Transactions on Information and System Security, vol.12, issue.1, 2008. ,
DOI : 10.1145/1410234.1410238