Information Technology Reference
In-Depth Information
15. Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated Generation
and Analysis of Attack Graphs. Proceedings of the IEEE Symposium on Security
and Privacy. IEEE Computer Society (2002) 254-265
16. Sheyner, O., Wing, J.: Tools for Generating and Analyzing Attack Graphs. Pro-
ceedings of International Symposium on Formal Methods for Components and
Objects, LNCS 3188 (2004) 344-371
17. Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-Attack Graph Genera-
tion Tool. Proceedings DISCEX '01: DARPA Information Survivability Conference
and Exposition II. (June 2001) 307-321
18. Templeton, S.J., Levitt, K.: A Requires/Provides Model for Computer Attacks.
Proceedings of the New Security Paradigms Workshop. Ballycotton, County Cork,
Ireland. ACM Press (2000) 31-38
19. US-CERT: Vulnerability Note Number: 16532—BIND NXT record processing may
cause buffer overflow. http://www.kb.cert.org/vuls/id/16532
Search WWH ::




Custom Search