Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.217-224, 2002. ,
DOI : 10.1145/586110.586140
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.1162
Optimal security hardening using multiobjective optimization on attack tree models of networks, Proc. of ACM conference on Computer and communications security, pp.204-213, 2007. ,
Using Attack Graphs to Design Systems. Security and Privacy, IEEE, vol.5, issue.4, pp.80-83, 2007. ,
DOI : 10.1109/msp.2007.100
Evaluating Network Security With Two-Layer Attack Graphs, 2009 Annual Computer Security Applications Conference, 2009. ,
DOI : 10.1109/ACSAC.2009.22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.538.4676
A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.336-345, 2006. ,
DOI : 10.1145/1180405.1180446
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs, 2009 Annual Computer Security Applications Conference, pp.117-126, 2009. ,
DOI : 10.1109/ACSAC.2009.21
URL : http://cis.ksu.edu/~zhangs84/ReadingList/MIT09ACSAC.pdf
Threat modeling using attack trees, J. Comput. Sci. Coll, vol.23, issue.4, pp.124-131, 2008. ,
A systematic approach to multi-stage network attack analysis, Second IEEE International Information Assurance Workshop, 2004. Proceedings., pp.48-56, 2004. ,
DOI : 10.1109/IWIA.2004.1288037
A Framework for Analyzing and Mitigating the Vulnerabilities of Complex Systems via Attack and Protection Trees, 2007. ,
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, 2002. ,
DOI : 10.1109/SECPRI.2002.1004377
Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.121-130, 2006. ,
DOI : 10.1109/ACSAC.2006.39
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8029
An Annotated Review of Past Papers on Attack Graphs, 2005. ,
Managing attack graph complexity through visual hierarchical aggregation, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.109-118, 2004. ,
DOI : 10.1145/1029208.1029225
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.3529
A Scalable Approach to Analyzing Network Security using Compact Attack Graphs, Journal of Networks, vol.5, issue.5, 2010. ,
DOI : 10.4304/jnw.5.5.543-550
URL : http://doi.org/10.4304/jnw.5.5.543-550
Secrets and Lies: Digital Security in a Networked World, 2000. ,
DOI : 10.1002/9781119183631
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, vol.1, issue.1, pp.929-943, 2012. ,
DOI : 10.1002/sec.299
HARMs: Hierarchical Attack Representation Models for Network Security Analysis, Proc. of the 10th Australian Information Security Management Conference in SECAU Security Congress, 2012. ,
Identifying Critical Attack Assets in Dependency Attack Graphs, Proc. of the 13th European Symposium on Research in Computer Security, pp.18-34, 2008. ,
DOI : 10.1145/1052934.1052938
URL : http://cis.ksu.edu/~xou/publications/esorics08.pdf
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices, 21st Annual Computer Security Applications Conference (ACSAC'05), p.169, 2005. ,
DOI : 10.1109/CSAC.2005.58
Host-Centric Model Checking for Network Vulnerability Analysis, 2008 Annual Computer Security Applications Conference (ACSAC), pp.225-234, 2008. ,
DOI : 10.1109/ACSAC.2008.15
Time-efficient and cost-effective network hardening using attack graphs, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), 2012. ,
DOI : 10.1109/DSN.2012.6263942
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.660.2954
On credibility of simulation studies of telecommunication networks, IEEE Communications Magazine, vol.40, issue.1, pp.132-139, 2002. ,
DOI : 10.1109/35.978060
Akaroa-2: Exploiting network computing by distributing stochastic simulation, Proc. European Simulation Multiconference, pp.175-181, 1999. ,