A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
Scalable, graph-based network vulnerability analysis
Proceedings of the 9th ACM conference on Computer and communications security
Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Automated Generation and Analysis of Attack Graphs
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Simulating realistic network worm traffic for worm warning system design and testing
Proceedings of the 2003 ACM workshop on Rapid malcode
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Aggregated path authentication for efficient BGP security
Proceedings of the 12th ACM conference on Computer and communications security
Fast model-based penetration testing
WSC '04 Proceedings of the 36th conference on Winter simulation
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
Security Strength Measurement for Dongle-Protected Software
IEEE Security and Privacy
A model-based semi-quantitative approach for evaluating security of enterprise networks
Proceedings of the 2008 ACM symposium on Applied computing
Quantified security is a weak hypothesis: a critical survey of results and assumptions
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Intelligent network security assessment with modeling and analysis of attack patterns
Security and Communication Networks
Hi-index | 0.00 |
Simulation plays an important role in security evaluation. They give us insight into systems' responses to attacks and countermeasures, but the current state of the art is not well developed with regard to revealing unknown vulnerabilities--software models are unlikely to contain the minute flaws that real code does (such as buffer overflow) that admit penetration.