Optimal security hardening on attack tree models of networks: a cost-benefit analysis. Dewri, R., Ray, I., Poolsappasit, N., & Whitley, D. International Journal of Information Security, 11(3):167–188, June, 2012.  ![link Optimal security hardening on attack tree models of networks: a cost-benefit analysis [link]](https://bibbase.org/img/filetypes/link.svg) Paper  doi  bibtex
Paper  doi  bibtex   @Article{Dewri:2012:OSH,
  author =       "Rinku Dewri and Indrajit Ray and Nayot Poolsappasit
                 and Darrell Whitley",
  title =        "Optimal security hardening on attack tree models of
                 networks: a cost-benefit analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "167--188",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0160-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0160-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
} 
Downloads: 0
{"_id":{"_str":"535ed25b97e559e821000510"},"__v":1,"authorIDs":[],"author_short":["Dewri, R.","Ray, I.","Poolsappasit, N.","Whitley, D."],"bibbaseid":"dewri-ray-poolsappasit-whitley-optimalsecurityhardeningonattacktreemodelsofnetworksacostbenefitanalysis-2012","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Rinku"],"propositions":[],"lastnames":["Dewri"],"suffixes":[]},{"firstnames":["Indrajit"],"propositions":[],"lastnames":["Ray"],"suffixes":[]},{"firstnames":["Nayot"],"propositions":[],"lastnames":["Poolsappasit"],"suffixes":[]},{"firstnames":["Darrell"],"propositions":[],"lastnames":["Whitley"],"suffixes":[]}],"title":"Optimal security hardening on attack tree models of networks: a cost-benefit analysis","journal":"International Journal of Information Security","volume":"11","number":"3","pages":"167–188","month":"June","year":"2012","coden":"????","doi":"https://doi.org/10.1007/s10207-012-0160-y","issn":"1615-5262 (print), 1615-5270 (electronic)","issn-l":"1615-5262","bibdate":"Tue Jan 23 16:01:37 MST 2018","bibsource":"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib","url":"http://link.springer.com/article/10.1007/s10207-012-0160-y","acknowledgement":"Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \\path|beebe@math.utah.edu|, \\path|beebe@acm.org|, \\path|beebe@computer.org| (Internet), URL: \\path|https://www.math.utah.edu/ beebe/|","fjournal":"International Journal of Information Security","journal-url":"https://link.springer.com/journal/10207","bibtex":"@Article{Dewri:2012:OSH,\n  author =       \"Rinku Dewri and Indrajit Ray and Nayot Poolsappasit\n                 and Darrell Whitley\",\n  title =        \"Optimal security hardening on attack tree models of\n                 networks: a cost-benefit analysis\",\n  journal =      j-INT-J-INFO-SEC,\n  volume =       \"11\",\n  number =       \"3\",\n  pages =        \"167--188\",\n  month =        jun,\n  year =         \"2012\",\n  CODEN =        \"????\",\n  DOI =          \"https://doi.org/10.1007/s10207-012-0160-y\",\n  ISSN =         \"1615-5262 (print), 1615-5270 (electronic)\",\n  ISSN-L =       \"1615-5262\",\n  bibdate =      \"Tue Jan 23 16:01:37 MST 2018\",\n  bibsource =    \"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib\",\n  URL =          \"http://link.springer.com/article/10.1007/s10207-012-0160-y\",\n  acknowledgement = ack-nhfb,\n  fjournal =     \"International Journal of Information Security\",\n  journal-URL =  \"https://link.springer.com/journal/10207\",\n}\n\n","author_short":["Dewri, R.","Ray, I.","Poolsappasit, N.","Whitley, D."],"key":"Dewri:2012:OSH","id":"Dewri:2012:OSH","bibbaseid":"dewri-ray-poolsappasit-whitley-optimalsecurityhardeningonattacktreemodelsofnetworksacostbenefitanalysis-2012","role":"author","urls":{"Paper":"http://link.springer.com/article/10.1007/s10207-012-0160-y"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"article","biburl":"ftp.math.utah.edu/pub/tex/bib/intjinfosec.bib","downloads":0,"keywords":[],"search_terms":["optimal","security","hardening","attack","tree","models","networks","cost","benefit","analysis","dewri","ray","poolsappasit","whitley"],"title":"Optimal security hardening on attack tree models of networks: a cost-benefit analysis","year":2012,"dataSources":["jGrSs2aYARmRcupKy","fEXH7XH8oyBtpzKFi"]}