Estimating Potential IT Security Losses: An Alternative Quantitative Approach
IEEE Security and Privacy
A model-based semi-quantitative approach for evaluating security of enterprise networks
Proceedings of the 2008 ACM symposium on Applied computing
Network security simulation and evaluation
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Assessing operational impact in enterprise systems by mining usage patterns
DSOM'07 Proceedings of the Distributed systems: operations and management 18th IFIP/IEEE international conference on Managing virtualization of networks and services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer network defence situational awareness information requirements
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Fast black-box testing of system recovery code
Proceedings of the 7th ACM european conference on Computer Systems
Attack graph based evaluation of network security
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A novel data reduction technique
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Towards quantitative risk management for next generation networks
Telecommunication Economics
Hi-index | 0.00 |
Monitoring and quantifying component behavior is key to making networks reliable and robust. The agent-based architecture presented here continuously monitors network vulnerability metrics, providing new ways to measure the impact of faults and attacks.