Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Dewri, R., Ray, I., Poolsappasit, N., & Whitley, D. International Journal of Information Security, 11(3):167--188, Springer-Verlag, March, 2012.
Paper doi bibtex @article{Dewri2012,
author = {Dewri, Rinku and Ray, Indrajit and Poolsappasit, Nayot and Whitley, Darrell},
doi = {10.1007/s10207-012-0160-y},
issn = {1615-5262},
journal = {International Journal of Information Security},
language = {English},
keywords = {Bayesian Network-based Security Analysis},
month = mar,
number = {3},
pages = {167--188},
publisher = {Springer-Verlag},
title = {{Optimal security hardening on attack tree models of networks: a cost-benefit analysis}},
url = {http://dx.doi.org/10.1007/s10207-012-0160-y http://link.springer.com/10.1007/s10207-012-0160-y},
volume = {11},
year = {2012}
}
Downloads: 0
{"_id":{"_str":"535ed25b97e559e821000510"},"__v":1,"authorIDs":[],"author_short":["Dewri, R.","Ray, I.","Poolsappasit, N.","Whitley, D."],"bibbaseid":"dewri-ray-poolsappasit-whitley-optimalsecurityhardeningonattacktreemodelsofnetworksacostbenefitanalysis-2012","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Dewri"],"firstnames":["Rinku"],"suffixes":[]},{"propositions":[],"lastnames":["Ray"],"firstnames":["Indrajit"],"suffixes":[]},{"propositions":[],"lastnames":["Poolsappasit"],"firstnames":["Nayot"],"suffixes":[]},{"propositions":[],"lastnames":["Whitley"],"firstnames":["Darrell"],"suffixes":[]}],"doi":"10.1007/s10207-012-0160-y","issn":"1615-5262","journal":"International Journal of Information Security","language":"English","keywords":"Bayesian Network-based Security Analysis","month":"March","number":"3","pages":"167--188","publisher":"Springer-Verlag","title":"Optimal security hardening on attack tree models of networks: a cost-benefit analysis","url":"http://dx.doi.org/10.1007/s10207-012-0160-y http://link.springer.com/10.1007/s10207-012-0160-y","volume":"11","year":"2012","bibtex":"@article{Dewri2012,\nauthor = {Dewri, Rinku and Ray, Indrajit and Poolsappasit, Nayot and Whitley, Darrell},\ndoi = {10.1007/s10207-012-0160-y},\nissn = {1615-5262},\njournal = {International Journal of Information Security},\nlanguage = {English},\nkeywords = {Bayesian Network-based Security Analysis},\nmonth = mar,\nnumber = {3},\npages = {167--188},\npublisher = {Springer-Verlag},\ntitle = {{Optimal security hardening on attack tree models of networks: a cost-benefit analysis}},\nurl = {http://dx.doi.org/10.1007/s10207-012-0160-y http://link.springer.com/10.1007/s10207-012-0160-y},\nvolume = {11},\nyear = {2012}\n}\n","author_short":["Dewri, R.","Ray, I.","Poolsappasit, N.","Whitley, D."],"key":"Dewri2012","id":"Dewri2012","bibbaseid":"dewri-ray-poolsappasit-whitley-optimalsecurityhardeningonattacktreemodelsofnetworksacostbenefitanalysis-2012","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/s10207-012-0160-y http://link.springer.com/10.1007/s10207-012-0160-y"},"keyword":["Bayesian Network-based Security Analysis"],"downloads":0},"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/14215034/bibs/bibs/A-List-bb.bib","downloads":0,"keywords":["bayesian network-based security analysis"],"search_terms":["optimal","security","hardening","attack","tree","models","networks","cost","benefit","analysis","dewri","ray","poolsappasit","whitley"],"title":"Optimal security hardening on attack tree models of networks: a cost-benefit analysis","year":2012,"dataSources":["jGrSs2aYARmRcupKy"]}