ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
2
views
7
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,245
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Managing Cyber Threats
Topological Analysis of Network Attack Vulnerability
other
Author(s):
Sushil Jajodia
,
Steven Noel
,
Brian O’Berry
Publication date
(Print):
2005
Publisher:
Springer-Verlag
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Core Readings in Statistical Mediation Analysis
Most cited references
7
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Scalable, graph-based network vulnerability analysis
Paul Ammann
,
Duminda Wijesekera
,
Saket Kaushik
(2002)
0
comments
Cited
23
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Automated generation and analysis of attack graphs
R. Lippmann
,
J. Haines
,
S. Jha
…
(2002)
0
comments
Cited
18
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Using model checking to analyze network vulnerabilities
P Ammann
,
R.W. Ritchey
(2024)
0
comments
Cited
10
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Pages
: 247-266
DOI:
10.1007/0-387-24230-9_9
SO-VID:
4a8809d1-0121-4d24-900a-1b51ef65ee44
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 19
Intrusion Detection: A Survey
pp. 247
Topological Analysis of Network Attack Vulnerability
Similar content
4,245
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack
Authors:
Jiguo Li
,
Min Wang
,
Yang Lu
…
Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data
Authors:
Jin Wook Byun
,
Hyun Rhee
,
Hyun-A Park
…
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack
Authors:
Yunhao Ling
,
Sha Ma
,
Qiong Huang
…
See all similar
Cited by
7
Detecting and Preventing Cyber Insider Threats: A Survey
Authors:
Liu Liu
,
Olivier de Vel
,
Qing-Long Han
…
A Security Analysis Method for Industrial Internet of Things
Authors:
Haralambos Mouratidis
,
Vasiliki Diamantopoulou
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art
Authors:
Suleman Khan
,
Abdullah Gani
,
Ainuddin Abdul Wahab
…
See all cited by