112 lines
4.7 KiB
Plaintext
112 lines
4.7 KiB
Plaintext
\begin{thebibliography}{10}
|
||
|
||
\bibitem{phillips_graph-based_1998}
|
||
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
|
||
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
|
||
F1292, pp.~71--79, 1998.
|
||
\newblock doi: 10.1145/310889.310919.
|
||
|
||
\bibitem{schneier_modeling_1999}
|
||
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
|
||
\newblock vol. 24, no.12.
|
||
|
||
\bibitem{ou_scalable_2006}
|
||
X.~Ou, W.~F. Boyer, and M.~A. Mcqueen, ``A {Scalable} {Approach} to {Attack}
|
||
{Graph} {Generation},'' {\em CCS '06: Proceedings of the 13th ACM conference
|
||
on Computer and communications security}, pp.~336--345, 2006.
|
||
|
||
\bibitem{CPSIOT}
|
||
A.~T. Al~Ghazo, M.~Ibrahim, H.~Ren, and R.~Kumar, ``A2g2v: Automated attack
|
||
graph generator and visualizer,'' in {\em Proceedings of the 1st ACM MobiHoc
|
||
Workshop on Mobile IoT Sensing, Security, and Privacy}, Mobile IoT SSP'18,
|
||
(New York, NY, USA), Association for Computing Machinery, 2018.
|
||
|
||
\bibitem{ming_jo}
|
||
M.~Li, P.~Hawrylak, and J.~Hale, ``Strategies for practical hybrid attack graph
|
||
generation and analysis,'' {\em Digital Threats}, oct 2021.
|
||
\newblock Just Accepted.
|
||
|
||
\bibitem{10.1145/3105760}
|
||
L.~Mu\~{n}oz Gonz\'{a}lez, D.~Sgandurra, A.~Paudice, and E.~C. Lupu,
|
||
``Efficient attack graph analysis through approximate inference,'' {\em ACM
|
||
Trans. Priv. Secur.}, vol.~20, jul 2017.
|
||
|
||
\bibitem{8290918}
|
||
H.~Wang, Z.~Chen, J.~Zhao, X.~Di, and D.~Liu, ``A vulnerability assessment
|
||
method in industrial internet of things based on attack graph and maximum
|
||
flow,'' {\em IEEE Access}, vol.~6, pp.~8599--8609, 2018.
|
||
|
||
\bibitem{centrality_based}
|
||
T.~Gonda, T.~Pascal, R.~Puzis, G.~Shani, and B.~Shapira, ``Analysis of attack
|
||
graph representations for ranking vulnerability fixes,'' 09 2018.
|
||
|
||
\bibitem{j_hale_compliance_nodate}
|
||
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
|
||
{Cyber}-{Physical} {System}.''
|
||
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
|
||
|
||
\bibitem{baloyi_guidelines_2019}
|
||
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
|
||
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
|
||
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
|
||
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
|
||
South Africa), Association for Computing Machinery, 2019.
|
||
|
||
\bibitem{allman_complying_2006}
|
||
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
|
||
{\em ACM Queue}, vol.~4, no.~7, 2006.
|
||
|
||
\bibitem{sheyner_automated_2002}
|
||
O.~Sheyner, J.~Haines, S.~Jha, R.~Lippmann, and J.~Wing, ``Automated
|
||
{Generation} and {Analysis} of {Attack} {Graphs},'' {\em Proceeding of 2002
|
||
IEEE Symposium on Security and Privacy}, pp.~254--265, 2002.
|
||
|
||
\bibitem{zhang_boosting_2017}
|
||
J.~Zhang, S.~Khoram, and J.~Li, ``Boosting the performance of {FPGA}-based
|
||
graph processor using hybrid memory cube: {A} case for breadth first
|
||
search,'' {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International
|
||
Symposium on Field-Programmable Gate Arrays}, pp.~207--216, 2017.
|
||
|
||
\bibitem{Monotonicity}
|
||
P.~Ammann, D.~Wijesekera, and S.~Kaushik, ``Scalable, graph-based network
|
||
vulnerability analysis,'' in {\em Proceedings of the 9th ACM Conference on
|
||
Computer and Communications Security}, CCS '02, (New York, NY, USA),
|
||
p.~217–224, Association for Computing Machinery, 2002.
|
||
|
||
\bibitem{TVA}
|
||
S.~Jajodia and S.~Noel, {\em Topological Vulnerability Analysis}, vol.~46,
|
||
pp.~139--154.
|
||
\newblock 09 2010.
|
||
|
||
\bibitem{louthan_hybrid_2011}
|
||
G.~Louthan, {\em Hybrid {Attack} {Graphs} for {Modeling} {Cyber}-{Physical}
|
||
{Systems}}.
|
||
\newblock PhD thesis, The {University} of {Tulsa}, 2011.
|
||
|
||
\bibitem{cook_rage_2018}
|
||
K.~Cook, {\em {RAGE}: {The} {Rage} {Attack} {Graph} {Engine}}.
|
||
\newblock PhD thesis, The {University} of {Tulsa}, 2018.
|
||
|
||
\bibitem{nichols_2018}
|
||
W.~M. Nichols, {\em {Hybrid} {Attack} {Graphs} for {Use} with a {Simulation} of
|
||
a {Cyber-Physical} {System}}.
|
||
\newblock PhD thesis, The {University} of {Tulsa}, 2018.
|
||
|
||
\bibitem{DMCA}
|
||
``H.r.2281 - {Digital {Millennium} {Copyright} {Act}}.''
|
||
\newblock Pub. L. No. 105-304. 1998 [Online]. Available:
|
||
https://www.govinfo.gov/content/pkg/PLAW-105publ304/html/PLAW-105publ304.htm.
|
||
|
||
\bibitem{Piracy}
|
||
Y.~Kim, J.~Moon, S.~J. Cho, M.~Park, and S.~Han, ``Efficient identification of
|
||
windows executable programs to prevent software piracy,'' in {\em 2014 Eighth
|
||
International Conference on Innovative Mobile and Internet Services in
|
||
Ubiquitous Computing}, pp.~236--240, 2014.
|
||
|
||
\bibitem{AndroidPiracy}
|
||
N.~Kumari and M.~Chen, ``Malware and piracy detection in android
|
||
applications,'' in {\em 2022 IEEE 5th International Conference on Multimedia
|
||
Information Processing and Retrieval (MIPR)}, pp.~306--311, 2022.
|
||
|
||
\end{thebibliography}
|