2004
DOI: 10.1109/msp.2004.109
|View full text |Cite
|
Sign up to set email alerts
|

Risk-based systems security engineering: stopping attacks with intention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
20
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(21 citation statements)
references
References 0 publications
1
20
0
Order By: Relevance
“…Nevertheless, if quantitative methods cannot play the same pivotal role in security as in the safety area, they already provide a helpful tool for the security analyst and have found their place in different risk assessment methodologies (cf. [50,51] for attack trees).…”
Section: B General Limits and The Way Forwardmentioning
confidence: 99%
“…Nevertheless, if quantitative methods cannot play the same pivotal role in security as in the safety area, they already provide a helpful tool for the security analyst and have found their place in different risk assessment methodologies (cf. [50,51] for attack trees).…”
Section: B General Limits and The Way Forwardmentioning
confidence: 99%
“…BLADE IDS Informer [8] is used to send various attack packets to other hosts so that Snort can monitor different kinds of warning events. These warning events are correlated to generate different warning sequences which are used to train hidden Markov models.…”
Section: B Initializing and Training Of Hidden Markov Modelsmentioning
confidence: 99%
“…Traditional risk assessment analyzes attack impact and likelihood of occurrence [2] [3][4] [5], but it remains difficult to quantify mission-level impact. Several recent research endeavors have sought to comprehend the relationship between information attack and mission impact [6] [7][8] [9] [10].…”
Section: Motivationmentioning
confidence: 99%