A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Model checking security properties of control flow graphs
Journal of Computer Security
Writing Secure Code
Scalable, graph-based network vulnerability analysis
Proceedings of the 9th ACM conference on Computer and communications security
Two Formal Analys s of Attack Graphs
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Threat Modeling
Computer security strength and risk: a quantitative approach
Computer security strength and risk: a quantitative approach
Information Security Risk Analysis
Information Security Risk Analysis
Software Security: Building Security In
Software Security: Building Security In
Hi-index | 0.00 |
This tutorial provides an overview of the best industrial practices in IT security analysis followed by a sketch of recent research results in this area, especially results providing formal foundations and more powerful tools for security analysis. The conclusion suggests directions for further work to fill the gaps between formal methods and industrial practices.