Amanote Research
Register
Sign In
Two Formal Analyses of Attack Graphs
doi 10.1109/csfw.2002.1021806
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
S. Jha
O. Sheyner
J. Wing
Publisher
IEEE Comput. Soc
Related search
A Formal Proof of the Minor-Exclusion Property for Treewidth-Two Graphs
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Use of Attack Graphs in Security Systems
Journal of Computer Networks and Communications
Computer Networks
Information Systems
Communications
An Annotated Review of Past Papers on Attack Graphs
Publishing Attributed Social Graphs With Formal Privacy Guarantees
Vulnerability Assessment by Learning Attack Specifications in Graphs
Aggregating Vulnerability Metrics in Enterprise Networks Using Attack Graphs
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Exploring, Reasoning With and Validating Directed Graphs by Applying Formal Concept Analysis to Conceptual Graphs
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Time-Efficient and Cost-Effective Network Hardening Using Attack Graphs
Relaxed Two-Coloring of Cubic Graphs
Journal of Combinatorial Theory. Series B
Combinatorics
Computational Theory
Discrete Mathematics
Theoretical Computer Science
Mathematics