• Non ci sono risultati.

Netspa: A network security planning architecture

N/A
N/A
Protected

Academic year: 2021

Condividi "Netspa: A network security planning architecture"

Copied!
2
0
0

Testo completo

(1)

Bibliografia

[1] M. L. Artz. Netspa: A network security planning architecture. PhD thesis, Massachusetts Institute of Technology, 2002.

[2] F. Baiardi, F. Corò, F. Tonelli, and L. Guidi. Gvscan: Scanning net- works for global vulnerabilities. In First International Workshop on Emerging Cyberthreats and Countermeasure, 2013.

[3] F. Baiardi and D. Sgandurra. Assessing ict risk through a monte carlo method.

Environment Systems and Decisions, pages 1–14, 2013.

[4] R. Bertolotti. Simulazione di attacchi contro infrastrutture ict: applicazione a casi reali. 2012.

[5] F. Carrano. Data Structures and Abstractions with Java [With Access Code].

Always learning. Pearson Prentice Hall, 2011.

[6] T. Cormen, C. Leiserson, R. Rivest, C. Mereghetti, and A. Fabrizio.

Introduzione agli algoritmi. Jackson Libri, 1999.

[7] C. Demetrescu, I. Finocchi, and G. Italiano. Algoritmi e strutture dati.

Istruzione scientifica. McGraw-Hill Companies, 2004.

[8] E. Gansner, E. Koutsofios, and S. North. Drawing graphs with dot, 2010.

[9] M. Goodrich, R. Tamassia, W. Balzano, and R. Sorbo. Strutture dati e algoritmi in Java. Zanichelli, 2007.

[10] K. Ingols, R. Lippmann, and K. Piwowarski. Practical attack graph genera- tion for network defense. In Computer Security Applications Conference, 2006.

ACSAC’06. 22nd Annual, pages 121–130. IEEE, 2006.

[11] B. Kordy, L. Piètre-Cambacédès, and P. Schweitzer. Dag-based attack and defense modeling: Don’t miss the forest for the attack trees. arXiv preprint arXiv:1303.7397, 2013.

[12] R. P. Lippmann and K. W. Ingols. An annotated review of past papers on attack graphs. Technical report, DTIC Document, 2005.

[13] R. P. Lippmann, K. W. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham. Evaluating and strengthening enterprise network security using attack graphs. Defense Technical Information Center, 2005.

58

(2)

[14] Microsoft. Msdn library, 2013.

[15] Oracle. Java, platform standard edition 7 api specification, 2013.

[16] Oracle. The java tutorial, 2013.

[17] R. Sedgewick and K. Wayne. Algorithms. Pearson Education, 2011.

[18] O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated gene- ration and analysis of attack graphs. In Security and Privacy, 2002. Proceedings.

2002 IEEE Symposium on, pages 273–284. IEEE, 2002.

[19] D. Watt and D. Brown. Java collections: an introduction to abstract data types, data structures, and algorithms. John Wiley, 2001.

[20] Y. Zhang and V. Paxson. Detecting stepping stones. In Proceedings of the 9th USENIX Security Symposium, volume 171, page 184, 2000.

59

Riferimenti

Documenti correlati

eGFP, enhanced Green Fluorescent Protein; NO, Nitric Oxide.. 53…………3.2 Validation of the expression of alpha- and beta- globin transcripts in A9 DA cells.

The measurement of CFTR channel activity using this new assay appears specific for CFTR function, as demonstrated with the use of different disease models: FRT cells transfected

– A subject that holds an e-capability defined in terms of the owner password of a given object is in a position to revoke the access permissions granted by every other

Le prove di apnea statica hanno indotto un evidente aumento (circa +38%) delle resistenze vascolari sistemiche (grafico 3) rispetto al test A,. mentre per le

SCADA, or Supervisory Control and Data Acquisition, is just one specific piece of an industrial network, separate from the control systems themselves, which should be referred to

Legitimate handshake  quando il client riceve il pacchetto del SYN/ACK dal server e risponde con l’ACK appropriato per completare handshake e iniziare la connessione

The main architecture we focused on was a network with a visible layer of 784 units (the input layer is this big because each neuron is responsible for the state of a pixel of an

Furthermore, we have been able to show that nuclear Ca 2+ spiking can also be activated by germinated spore exudates in both Medicago and carrot epidermal cells from the root