Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, version 1, 1999. ,
Safe exchange of information for civil-military operations, Military Communications and Information Technology: A Comprehensive Approach Enabler, pp.39-50, 2010. ,
Bayesian Reasoning and Machine Learning, 2013. ,
DOI : 10.1017/CBO9780511804779
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.232.8159
Using Strategy Objectives for Network Security Analysis, 5th China International Conference on Information Security and Cryptology (Inscrypt), 2009. ,
DOI : 10.1007/978-3-642-16342-5_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.9746
Modeling and reasoning with Bayesian networks, Cambridge Univ, 2009. ,
DOI : 10.1017/CBO9780511811357
A NNEC-compliant approach for a Future Mission Network, MILCOM 2012, 2012 IEEE Military Communications Conference, 2012. ,
DOI : 10.1109/MILCOM.2012.6415626
Guide to Attribute Based Access Control Definition and Considerations (Draft) NIST Special Publication, pp.800-162, 2013. ,
DOI : 10.6028/nist.sp.800-162
Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.121-130, 2006. ,
DOI : 10.1109/ACSAC.2006.39
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8029
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis, 2008. ,
DOI : 10.1007/978-1-4614-5104-4
Cyber Defence Situational Awareness and Dynamic Risk Assessment, NATO Research and Technology Organisation Symposium on Information Assurance and Cyber Defence, 2010. ,
Local computations with probabilities on graphical structures and their application to expert systems, Journal of the Royal Statistical Society series B, vol.50, pp.157-224, 1988. ,
A Formal Model for Network-Wide Security Analysis, Proceedings of the 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp.171-181, 2008. ,
Risk-adaptable access control (radac) In: NIST Privilege (Access, 2009. ,
MAGERIT ? version 2, Methodology for Information Systems Risk Analysis and Management, Book I ? The Method, 2006. ,
Designing Reliable Web Security Systems Using Rule-Based Systems Approach, Advances in Web Intelligence . AWIC Conference 2003, LNAI, pp.124-133, 2003. ,
DOI : 10.1007/3-540-44831-4_14
FORMALIZATION AND MODELING OF RULES USING THE XTT2 METHOD, International Journal on Artificial Intelligence Tools, vol.20, issue.06, pp.1107-1125, 2011. ,
DOI : 10.1002/widm.11
MulVAL: A logic-based network security analyzer, Proc. of 14th USENIX Security Symposium, 2005. ,
Attack Trees, In: Dr. Dobbs' Journal, 1999. ,
DOI : 10.1002/9781119183631.ch21
IOEM - Ontology Engineering Methodology for Large Systems, Computational Collective Intelligence: Technologies And Applications: ICCCI 2011 Conf, pp.602-611, 2011. ,
DOI : 10.1007/978-3-642-23935-9_59
Analysis of VME-Bus communication protocol - RTCP-net approach, Real-Time Systems, vol.31, issue.2, pp.91-108, 2007. ,
DOI : 10.1007/s11241-006-9003-0
Design and analysis of rule-based systems with Adder Designer Knowledge-Driven Computing: knowledge engineering and intelligent computations, Studies in Computational Intelligence, vol.102, pp.255-271, 2008. ,
Exclusion rule-based systems—case study, 2008 International Multiconference on Computer Science and Information Technology, pp.237-242, 2008. ,
DOI : 10.1109/IMCSIT.2008.4747245
Decision Tables in Petri Net Models, Rough Sets and Intelligent Systems Paradigms, LNAI, pp.648-657, 2007. ,
DOI : 10.1007/978-3-540-73451-2_68
Real-time automated risk assessment in protected core networking, Telecommunication Systems, vol.42, issue.2???3, pp.205-214, 2010. ,
DOI : 10.1007/s11235-009-9242-1
Controlled information sharing in NATO operations, 2011, MILCOM 2011 Military Communications Conference, pp.1285-1290, 2011. ,
DOI : 10.1109/MILCOM.2011.6127479