Sciweavers

22 search results - page 1 / 5
» Serial Model for Attack Tree Computations
Sort
View
ICISC
2009
140views Cryptology» more  ICISC 2009»
13 years 2 months ago
Serial Model for Attack Tree Computations
Aivo Jürgenson, Jan Willemson
IWSEC
2010
Springer
13 years 3 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
ICPPW
2002
IEEE
13 years 9 months ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins
CCS
2007
ACM
13 years 10 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
IEEEARES
2006
IEEE
13 years 10 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...