[1] M. Roesch, “Snort: Lightweight Intrusion Detection for Networks,” Proceedings of the 1999 USENIX LISA Conference, Seattle, WA, November 7–12, 1999, pp. 229–238.
[2] O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, “Automated Generation and Analysis of Attack Graphs,” Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P’02), 2002, pp. 273–284.
[3] P. Ammann, D. Wijesekera, and S. Kaushik, “Scalable, Graph-Based Network Vulnerability Analysis,” Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02), Washington, DC, 2002, pp. 217–224.
[4] S. Noel, S. Jajodia, B. O’Berry, and M. Jacobs, “Efficient Minimum-Cost Network Hardening via Exploit Dependency Graphs,” Proceedings of the 19th Annual ...
Get Information Assurance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.