Sciweavers

42 search results - page 1 / 9
» Implementing interactive analysis of attack graphs using rel...
Sort
View
JCS
2008
73views more  JCS 2008»
13 years 4 months ago
Implementing interactive analysis of attack graphs using relational databases
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 6 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
VIZSEC
2007
Springer
13 years 10 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
PPDP
2007
Springer
13 years 10 months ago
Interactive, scalable, declarative program analysis: from prototype to implementation
Static analyses provide the semantic foundation for tools ranging from optimizing compilers to refactoring browsers and advanced debuggers. Unfortunately, developing new analysis ...
William C. Benton, Charles N. Fischer
CINQ
2004
Springer
182views Database» more  CINQ 2004»
13 years 8 months ago
Mining Constrained Graphs: The Case of Workflow Systems
Abstract. Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the ...
Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, ...