ACM Transactions on Computer Systems (TOCS)
Graph-Based Algorithms for Boolean Function Manipulation
IEEE Transactions on Computers
An Aggregation Technique for the Transient Analysis of Stiff Markov Chains
IEEE Transactions on Computers
The reliability of life-critical computer systems
Acta Informatica
Three partition refinement algorithms
SIAM Journal on Computing
Numerical transient analysis of Markov models
Computers and Operations Research
Performability Analysis: Measures, an Algorithm, and a Case Study
IEEE Transactions on Computers - Fault-Tolerant Computing
Performance Modeling Based on Real Data: A Case Study
IEEE Transactions on Computers - Fault-Tolerant Computing
Journal of the ACM (JACM)
Communication and concurrency
An implementation of an efficient algorithm for bisimulation equivalence
Science of Computer Programming
Performability Analysis Using Semi-Markov Reward Processes
IEEE Transactions on Computers
Computing Cumulative Measures of Stiff Markov Chains Using Aggregation
IEEE Transactions on Computers
Real-time Systems Performance in the Presence of Failures
Computer - Special issue on real-time systems
Stochastic Automata Network of Modeling Parallel Systems
IEEE Transactions on Software Engineering
X-Ware Reliability and Availability Modeling
IEEE Transactions on Software Engineering
A history of discrete event simulation programming languages
HOPL-II The second ACM SIGPLAN conference on History of programming languages
Symbolic model checking: 1020 states and beyond
Information and Computation - Special issue: Selections from 1990 IEEE symposium on logic in computer science
Dependability modeling of a heterogeneous VAX-cluster system using stochastic reward nets
Hardware and software fault tolerance in parallel computing systems
Markov regenerative stochastic Petri nets
Performance '93 Proceedings of the 16th IFIP Working Group 7.3 international symposium on Computer performance modeling measurement and evaluation
Safeware: system safety and computers
Safeware: system safety and computers
Fast simulation of rare events in queueing and reliability models
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Hierarchical Markovian models: symmetries and reduction
Performance Evaluation - Special issue: 6th international conference on modelling techniques and tools for computer performance evaluation
The UltraSAN modeling environment
Performance Evaluation - Special issue: performance modeling tools
Calculating transient distributions of cumulative reward
Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package
A compositional approach to performance modelling
A compositional approach to performance modelling
Sufficient Conditions for Existence of a Fixed Point in Stochastic Reward Net-Based Iterative Models
IEEE Transactions on Software Engineering - Special issue: best papers of the sixth international workshop on Petri nets and performance models (PNPM'95)
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Theoretical Computer Science
Modeling and analysis of stochastic systems
Modeling and analysis of stochastic systems
An efficient disk-based tool for solving large Markov models
Performance Evaluation - Special issue on tools for performance evaluation
"On-the-Fly" Solution Techniques for Stochastic Petri Nets and Extensions
IEEE Transactions on Software Engineering
Exact performance equivalence: an equivalence relation for stochastic automata
Theoretical Computer Science
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
Model checking
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
An Efficient Algorithm for Aggregating PEPA Models
IEEE Transactions on Software Engineering
Architecture-based approach to reliability assessment of software systems
Performance Evaluation
Probability and statistics with reliability, queuing and computer science applications
Probability and statistics with reliability, queuing and computer science applications
Model checking security properties of control flow graphs
Journal of Computer Security
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Stochastic activity networks: formal definitions and concepts
Lectures on formal methods and performance analysis
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
A time/structure based software reliability model
Annals of Software Engineering
Stochastic Well-Formed Colored Nets and Symmetric Modeling Applications
IEEE Transactions on Computers
Discrete-Event Simulation of Fluid Stochastic Petri Nets
IEEE Transactions on Software Engineering
The Möbius Framework and Its Implementation
IEEE Transactions on Software Engineering
Code-Red: a case study on the spread and victims of an internet worm
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Performability Evaluation of Distributed Systems Using Stochastic Activity Networks
PNPM '87 The Proceedings of the Second International Workshop on Petri Nets and Performance Models
SPNP: Stochastic Petri Net Package
PNPM '89 The Proceedings of the Third International Workshop on Petri Nets and Performance Models
Saturation: An Efficient Iteration Strategy for Symbolic State-Space Generation
TACAS 2001 Proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems
Extended Stochastic Petri Nets: Applications and Analysis
Performance '84 Proceedings of the Tenth International Symposium on Computer Performance Modelling, Measurement and Evaluation
On Petri nets with deterministic and exponentially distributed firing times
Advances in Petri Nets 1987, covers the 7th European Workshop on Applications and Theory of Petri Nets
Superposed Generalized Stochastic Petri Nets: Definition and Efficient Solution
Proceedings of the 15th International Conference on Application and Theory of Petri Nets
Reliability and Availability Analysis for the JPL Remote Exploration and Experimentation System
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Exploiting Symmetries in Stochastic Process Algebras
Proceedings of the 12th European Simulation Multiconference on Simulation - Past, Present and Future
Stochastic Activity Networks: Structure, Behavior, and Application
International Workshop on Timed Petri Nets
INFORMS Journal on Computing
A new methodology for calculating distributions of reward accumulated during a finite interval
FTCS '96 Proceedings of the The Twenty-Sixth Annual International Symposium on Fault-Tolerant Computing (FTCS '96)
FTCS '99 Proceedings of the Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing
CCS expressions, finite state processes, and three problems of equivalence
PODC '83 Proceedings of the second annual ACM symposium on Principles of distributed computing
Numerical analysis of stochastic marked graph nets
PNPM '95 Proceedings of the Sixth International Workshop on Petri Nets and Performance Models
Numerical analysis of superposed GSPNs
PNPM '95 Proceedings of the Sixth International Workshop on Petri Nets and Performance Models
A Data Structure for the Efficient Kronecker Solution of GSPNs
PNPM '99 Proceedings of the The 8th International Workshop on Petri Nets and Performance Models
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A Measurement-Based Model for Estimation of Resource Exhaustion in Operational Software Systems
ISSRE '99 Proceedings of the 10th International Symposium on Software Reliability Engineering
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations
MASCOTS '02 Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
Efficient Solution of GSPNs Using Canonical Matrix Diagrams
PNPM '01 Proceedings of the 9th international Workshop on Petri Nets and Performance Models (PNPM'01)
A Semantic Model for Authentication Protocols
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Using Model Checking to Analyze Network Vulnerabilities
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Monitoring and early warning for internet worms
Proceedings of the 10th ACM conference on Computer and communications security
Optimal state-space lumping in Markov chains
Information Processing Letters
A BDD-Based Algorithm for Analysis of Multistate Systems with Multistate Components
IEEE Transactions on Computers
Ferret: A Host Vulnerability Checking Tool
PRDC '04 Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'04)
A Structured Path-Based Approach for Computing Transient Rewards of Large CTMCs
QEST '04 Proceedings of the The Quantitative Evaluation of Systems, First International Conference
Survivability Analysis of Telephone Access Network
ISSRE '04 Proceedings of the 15th International Symposium on Software Reliability Engineering
Model-Based Validation of an Intrusion-Tolerant Information System
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
Security analysis of SITAR intrusion tolerance system
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Queueing Networks and Markov Chains
Queueing Networks and Markov Chains
Fast model-based penetration testing
WSC '04 Proceedings of the 36th conference on Winter simulation
Interactive Markov chains: and the quest for quantified quality
Interactive Markov chains: and the quest for quantified quality
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy
IEEE Transactions on Dependable and Secure Computing
IBM Journal of Research and Development - IBM BladeCenter systems
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Middleware for semantic-based security and safety management of open services
International Journal of Web and Grid Services
International Journal of Information and Computer Security
A model-based semi-quantitative approach for evaluating security of enterprise networks
Proceedings of the 2008 ACM symposium on Applied computing
Journal of Systems and Software
Evaluation of Critical Infrastructures: Challenges and Viable Approaches
Architecting Dependable Systems V
Analysis of User Perceived QoS in Ubiquitous UMTS Environments Subject to Faults
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
The risks with security metrics
Proceedings of the 4th ACM workshop on Quality of protection
An integrated framework for the dependability evaluation of distributed mobile applications
Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems
Reliability and survivability methodologies for next generation networks
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Transactions on Computational Science IV
Software security analysis and assessment model for the web-based applications
Journal of Computational Methods in Sciences and Engineering
Future Generation Computer Systems
Availability analysis of blade server systems
IBM Systems Journal
Using security metrics coupled with predictive modeling and simulation to assess security processes
ESEM '09 Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement
Resilience in computer systems and networks
Proceedings of the 2009 International Conference on Computer-Aided Design
Quantified security is a weak hypothesis: a critical survey of results and assumptions
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers
Journal of Management Information Systems
Optimizing security measures in an intrusion tolerant database system
ISAS'08 Proceedings of the 5th international conference on Service availability
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dependability metrics
Security analysis for online banking system using hierarchical stochastic game nets model
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Security analysis of enterprise network based on stochastic game nets model
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Cybersecurity for critical infrastructures: attack and defense modeling
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Using Markov chain analysis to study dynamic behaviour in large-scale grid systems
AusGrid '09 Proceedings of the Seventh Australasian Symposium on Grid Computing and e-Research - Volume 99
Performance and security tradeoff
SFM'10 Proceedings of the Formal methods for quantitative aspects of programming languages, and 10th international conference on School on formal methods for the design of computer, communication and software systems
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Attack and defense modeling with BDMP
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
On design tradeoffs between security and performance in wireless group communicating systems
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Dependability analysis and verification for CONNECTed systems
ISoLA'10 Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II
Wireless Personal Communications: An International Journal
Towards security evaluation based on evidence collection
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Quantifying the security of composed systems
PPAM'05 Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics
Survivability analysis of grid resource management system topology
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
A dependable task scheduling strategy for a fault tolerant grid model
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
On data dissemination for large-scale complex critical infrastructures
Computer Networks: The International Journal of Computer and Telecommunications Networking
A requirement centric framework for information security evaluation
IWSEC'06 Proceedings of the 1st international conference on Security
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees
Security and Communication Networks
International Journal of Critical Computer-Based Systems
Dependability in dynamic, evolving and heterogeneous systems: the connect approach
Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems
Quantitative security evaluation of a multi-biometric authentication system
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Modeling and security analysis of enterprise network using attack–defense stochastic game Petri nets
Security and Communication Networks
Quantitative survivability evaluation of three virtual machine-based server architectures
Journal of Network and Computer Applications
A stochastic model of attack process for the evaluation of security metrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
FORTUNA-A framework for the design and development of hardware-based secure systems
Journal of Systems and Software
Go with the flow: toward workflow-oriented security assessment
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
The development of techniques for quantitative, model-based evaluation of computer system dependability has a long and rich history. A wide array of model-based evaluation techniques is now available, ranging from combinatorial methods, which are useful for quick, rough-cut analyses, to state-based methods, such as Markov reward models, and detailed, discrete-event simulation. The use of quantitative techniques for security evaluation is much less common, and has typically taken the form of formal analysis of small parts of an overall design, or experimental red team-based approaches. Alone, neither of these approaches is fully satisfactory, and we argue that there is much to be gained through the development of a sound model-based methodology for quantifying the security one can expect from a particular design. In this work, we survey existing model-based techniques for evaluating system dependability, and summarize how they are now being extended to evaluate system security. We find that many techniques from dependability evaluation can be applied in the security domain, but that significant challenges remain, largely due to fundamental differences between the accidental nature of the faults commonly assumed in dependability evaluation, and the intentional, human nature of cyber attacks.