Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users, Proc. 5th Int'l Conf. on Information Warfare and Security, 2010. ,
Mission Impact Assessment for Cyber Warfare. Book chapter in Intelligent Methods for Cyber Warfare, 2015. ,
DOI : 10.1007/978-3-319-08624-8_11
Mission Cyber Security Situation Assessment Using Impact Dependency Graphs, In Information Fusion (FUSION), 2011. ,
Identifying critical attack assets in dependency attack graphs. Defense R&D Canada-Ottawa, 2008. ,
DOI : 10.1007/978-3-540-88313-5_2
URL : http://cis.ksu.edu/~xou/publications/esorics08.pdf
On ordered weighted averaging aggregation operators in multicriteria decisionmaking, IEEE Transactions on Systems, Man, and Cybernetics, vol.18, issue.1, pp.183-190, 1988. ,
DOI : 10.1109/21.87068
A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180446
URL : http://www.cse.psu.edu/~tjaeger/cse598-f11/docs/ou_attack_graphs.pdf
MulVAL: A Logic-based Network Security Analyzer. USENIX security, 2005. ,
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, 2002. ,
DOI : 10.1109/SECPRI.2002.1004377
Model-based analysis of configuration vulnerabilities, Journal of Computer Security, 2002. ,
A graph-based system for network-vulnerability analysis, Proceedings of the 1998 workshop on New security paradigms , NSPW '98, 1998. ,
DOI : 10.1145/310889.310919
URL : https://digital.library.unt.edu/ark:/67531/metadc711473/m2/1/high_res_d/672082.pdf
Topological analysis of network attack vulnerability , Managing Cyber Threats, 2005. ,
DOI : 10.1145/1229285.1229288
Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586140
Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006. ,
DOI : 10.1109/ACSAC.2006.39
URL : http://www.acsac.org/2006/papers/70.pdf
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks, 2014. ,
DOI : 10.1109/CSAC.2003.1254306
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis, 2011 IEEE Symposium on Security and Privacy, 2011. ,
DOI : 10.1109/SP.2011.31
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653687
Cache side-channel attacks in cloud computing, International Conference on Cloud Security Management (ICCSM), 2014. ,
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions, Proceedings of the 8th USENIX conference on Operating systems design and implementation (OSDI), 2008. ,
NSDMiner: Automated discovery of Network Service Dependencies, 2012 Proceedings IEEE INFOCOM, 2012. ,
DOI : 10.1109/INFCOM.2012.6195642
URL : http://discovery.csc.ncsu.edu/pubs/infocom12-NSDMiner.pdf
On the accurate identification of network service dependencies in distributed systems, USENIX Association Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques ,