Bibliografia
[1] M. L. Artz. Netspa: A network security planning architecture. PhD thesis, Massachusetts Institute of Technology, 2002.
[2] F. Baiardi, F. Corò, F. Tonelli, and L. Guidi. Gvscan: Scanning net- works for global vulnerabilities. In First International Workshop on Emerging Cyberthreats and Countermeasure, 2013.
[3] F. Baiardi and D. Sgandurra. Assessing ict risk through a monte carlo method.
Environment Systems and Decisions, pages 1–14, 2013.
[4] R. Bertolotti. Simulazione di attacchi contro infrastrutture ict: applicazione a casi reali. 2012.
[5] F. Carrano. Data Structures and Abstractions with Java [With Access Code].
Always learning. Pearson Prentice Hall, 2011.
[6] T. Cormen, C. Leiserson, R. Rivest, C. Mereghetti, and A. Fabrizio.
Introduzione agli algoritmi. Jackson Libri, 1999.
[7] C. Demetrescu, I. Finocchi, and G. Italiano. Algoritmi e strutture dati.
Istruzione scientifica. McGraw-Hill Companies, 2004.
[8] E. Gansner, E. Koutsofios, and S. North. Drawing graphs with dot, 2010.
[9] M. Goodrich, R. Tamassia, W. Balzano, and R. Sorbo. Strutture dati e algoritmi in Java. Zanichelli, 2007.
[10] K. Ingols, R. Lippmann, and K. Piwowarski. Practical attack graph genera- tion for network defense. In Computer Security Applications Conference, 2006.
ACSAC’06. 22nd Annual, pages 121–130. IEEE, 2006.
[11] B. Kordy, L. Piètre-Cambacédès, and P. Schweitzer. Dag-based attack and defense modeling: Don’t miss the forest for the attack trees. arXiv preprint arXiv:1303.7397, 2013.
[12] R. P. Lippmann and K. W. Ingols. An annotated review of past papers on attack graphs. Technical report, DTIC Document, 2005.
[13] R. P. Lippmann, K. W. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham. Evaluating and strengthening enterprise network security using attack graphs. Defense Technical Information Center, 2005.
58
[14] Microsoft. Msdn library, 2013.
[15] Oracle. Java, platform standard edition 7 api specification, 2013.
[16] Oracle. The java tutorial, 2013.
[17] R. Sedgewick and K. Wayne. Algorithms. Pearson Education, 2011.
[18] O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated gene- ration and analysis of attack graphs. In Security and Privacy, 2002. Proceedings.
2002 IEEE Symposium on, pages 273–284. IEEE, 2002.
[19] D. Watt and D. Brown. Java collections: an introduction to abstract data types, data structures, and algorithms. John Wiley, 2001.
[20] Y. Zhang and V. Paxson. Detecting stepping stones. In Proceedings of the 9th USENIX Security Symposium, volume 171, page 184, 2000.
59