[1]
L. Wang,A. Singhal, and S. Jajodia. Measuring network security using attack graphs. In Proceedings of the 3rd ACM workshop on Quality of protection(Qop'07), New York, NY, USA, 2007. ACM Press.
DOI: 10.1145/1314257.1314273
Google Scholar
[2]
L. Wang,C. Yao,A. Singhal, and S. Jajodia. Interactive analysis of attack graphs using relational queries. In Proceedings of 20th IFIP WG 11. 3 Working Conference on Data and Applications Security(DBSEC'06), pages 119-132, (2006).
DOI: 10.1007/11805588_9
Google Scholar
[3]
Y. Liu,H. Man. Network vulnerability assessment using Bayesian networks. In Proceeding of Data Mining, Intrusion Detection, Information Assurance and Data Networks Security, pages 61-71, (2005).
DOI: 10.1117/12.604240
Google Scholar
[4]
S. Jajodia,S. Noel, and B. O'Berry. Topological analysis of network attack vulnerability. In V. Kumar,J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publisher, (2003).
DOI: 10.1007/0-387-24230-9_9
Google Scholar
[5]
Common vulnerability scoring system version2. Available at: http: /www. first. org/cvss/. (2011).
Google Scholar
[6]
National vulnerability database. Available at: http/www. vud. org.
Google Scholar
[7]
Pengsu Cheng. Security metric through combining CVSS base scores: [D]. Univ. of Concordia, (2011).
Google Scholar
[8]
M. Frigault and L. Wang. Measuring network security using Bayesian network-based attack graphs. In Proceedings of the 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA'08), (2008).
DOI: 10.1109/compsac.2008.88
Google Scholar
[9]
M. Frigault,L. Wang, A. Singhal, and S. Jajodia. Measuring network security using dynamic Bayesian network. In Proceedings of ACM workshop on Quality of protection, (2008).
DOI: 10.1145/1456362.1456368
Google Scholar
[10]
Paul Ammann, Duminda Wijesekera, and Saket Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, pages 217-224, (2002).
DOI: 10.1145/586110.586140
Google Scholar
[11]
Boston university representative internet topology generator. Available at http: /www. cs. bu. edu/brite.
Google Scholar