End-to-end network access analysis, HP Laboratories Technical Report HPL-2008-28R1. HP Labs, 2008. ,
The total cost of security patch management, 2005. ,
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs, 2009 Annual Computer Security Applications Conference, 2009. ,
DOI : 10.1109/ACSAC.2009.21
URL : http://cis.ksu.edu/~zhangs84/ReadingList/MIT09ACSAC.pdf
Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.121-130, 2006. ,
DOI : 10.1109/ACSAC.2006.39
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8029
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs, Journal of Network and Systems Management, 2008. ,
DOI : 10.1007/s10922-008-9109-x
A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.336-345, 2006. ,
DOI : 10.1145/1180405.1180446
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.1616
A weakest-adversary security metric for network configuration security analysis, Proceedings of the 2nd ACM workshop on Quality of protection , QoP '06, 2006. ,
DOI : 10.1145/1179494.1179502
Identifying Critical Attack Assets in Dependency Attack Graphs, 13th European Symposium on Research in Computer Security (ES- ORICS, 2008. ,
DOI : 10.1007/978-3-540-85933-8_7
URL : http://cis.ksu.edu/~xou/publications/esorics08.pdf
Techniques for enterprise network security metrics, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, 2009. ,
DOI : 10.1145/1558607.1558636