Topological Analysis of Network Attack Vulnerability. Jajodia, S., Noel, S., Berry, B. O, & O’Berry, B. In Kumar, V., Srivastava, J., & Lazarevic, A., editors, Managing Cyber Threats SE - 9, volume 5, of Massive Computing, pages 247--266. Springer US, 2005.
Paper doi bibtex @incollection{Jajodia2005,
author = {Jajodia, Sushil and Noel, Steven and Berry, Brian O and O’Berry, Brian},
booktitle = {Managing Cyber Threats SE - 9},
doi = {10.1007/0-387-24230-9\_9},
editor = {Kumar, Vipin and Srivastava, Jaideep and Lazarevic, Aleksandar},
isbn = {978-0-387-24226-2},
keywords = {Bayesian Network-based Security Analysis},
pages = {247--266},
publisher = {Springer US},
series = {Massive Computing},
title = {{Topological Analysis of Network Attack Vulnerability}},
url = {http://dx.doi.org/10.1007/0-387-24230-9\_9},
volume = {5},
year = {2005}
}
Downloads: 0
{"_id":"uMSAYBeYePePQa2X4","bibbaseid":"jajodia-noel-berry-oberry-topologicalanalysisofnetworkattackvulnerability-2005","downloads":0,"creationDate":"2016-12-08T00:37:45.170Z","title":"Topological Analysis of Network Attack Vulnerability","author_short":["Jajodia, S.","Noel, S.","Berry, B. O","O’Berry, B."],"year":2005,"bibtype":"incollection","biburl":"https://dl.dropboxusercontent.com/u/14215034/bibs/bibs/A-List-bb.bib","bibdata":{"bibtype":"incollection","type":"incollection","author":[{"propositions":[],"lastnames":["Jajodia"],"firstnames":["Sushil"],"suffixes":[]},{"propositions":[],"lastnames":["Noel"],"firstnames":["Steven"],"suffixes":[]},{"propositions":[],"lastnames":["Berry"],"firstnames":["Brian","O"],"suffixes":[]},{"propositions":[],"lastnames":["O’Berry"],"firstnames":["Brian"],"suffixes":[]}],"booktitle":"Managing Cyber Threats SE - 9","doi":"10.1007/0-387-24230-9_9","editor":[{"propositions":[],"lastnames":["Kumar"],"firstnames":["Vipin"],"suffixes":[]},{"propositions":[],"lastnames":["Srivastava"],"firstnames":["Jaideep"],"suffixes":[]},{"propositions":[],"lastnames":["Lazarevic"],"firstnames":["Aleksandar"],"suffixes":[]}],"isbn":"978-0-387-24226-2","keywords":"Bayesian Network-based Security Analysis","pages":"247--266","publisher":"Springer US","series":"Massive Computing","title":"Topological Analysis of Network Attack Vulnerability","url":"http://dx.doi.org/10.1007/0-387-24230-9_9","volume":"5","year":"2005","bibtex":"@incollection{Jajodia2005,\nauthor = {Jajodia, Sushil and Noel, Steven and Berry, Brian O and O’Berry, Brian},\nbooktitle = {Managing Cyber Threats SE - 9},\ndoi = {10.1007/0-387-24230-9\\_9},\neditor = {Kumar, Vipin and Srivastava, Jaideep and Lazarevic, Aleksandar},\nisbn = {978-0-387-24226-2},\nkeywords = {Bayesian Network-based Security Analysis},\npages = {247--266},\npublisher = {Springer US},\nseries = {Massive Computing},\ntitle = {{Topological Analysis of Network Attack Vulnerability}},\nurl = {http://dx.doi.org/10.1007/0-387-24230-9\\_9},\nvolume = {5},\nyear = {2005}\n}\n","author_short":["Jajodia, S.","Noel, S.","Berry, B. O","O’Berry, B."],"editor_short":["Kumar, V.","Srivastava, J.","Lazarevic, A."],"key":"Jajodia2005","id":"Jajodia2005","bibbaseid":"jajodia-noel-berry-oberry-topologicalanalysisofnetworkattackvulnerability-2005","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/0-387-24230-9_9"},"keyword":["Bayesian Network-based Security Analysis"],"downloads":0},"search_terms":["topological","analysis","network","attack","vulnerability","jajodia","noel","berry","o’berry"],"keywords":["bayesian network-based security analysis"],"authorIDs":[],"dataSources":["jGrSs2aYARmRcupKy"]}