71 lines
2.9 KiB
Plaintext
71 lines
2.9 KiB
Plaintext
\begin{thebibliography}{10}
|
||
|
||
\bibitem{phillips_graph-based_1998}
|
||
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
|
||
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
|
||
F1292, pp.~71--79, 1998.
|
||
\newblock doi: 10.1145/310889.310919.
|
||
|
||
\bibitem{schneier_modeling_1999}
|
||
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
|
||
\newblock vol. 24, no.12.
|
||
|
||
\bibitem{ou_scalable_2006}
|
||
X.~Ou, W.~F. Boyer, and M.~A. Mcqueen, ``A {Scalable} {Approach} to {Attack}
|
||
{Graph} {Generation},'' {\em CCS '06: Proceedings of the 13th ACM conference
|
||
on Computer and communications security}, pp.~336--345, 2006.
|
||
|
||
\bibitem{j_hale_compliance_nodate}
|
||
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
|
||
{Cyber}-{Physical} {System}.''
|
||
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
|
||
|
||
\bibitem{baloyi_guidelines_2019}
|
||
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
|
||
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
|
||
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
|
||
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
|
||
South Africa), Association for Computing Machinery, 2019.
|
||
|
||
\bibitem{allman_complying_2006}
|
||
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
|
||
{\em ACM Queue}, vol.~4, no.~7, 2006.
|
||
|
||
\bibitem{sheyner_automated_2002}
|
||
O.~Sheyner, J.~Haines, S.~Jha, R.~Lippmann, and J.~Wing, ``Automated
|
||
{Generation} and {Analysis} of {Attack} {Graphs},'' {\em Proceeding of 2002
|
||
IEEE Symposium on Security and Privacy}, pp.~254--265, 2002.
|
||
|
||
\bibitem{zhang_boosting_2017}
|
||
J.~Zhang, S.~Khoram, and J.~Li, ``Boosting the performance of {FPGA}-based
|
||
graph processor using hybrid memory cube: {A} case for breadth first
|
||
search,'' {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International
|
||
Symposium on Field-Programmable Gate Arrays}, pp.~207--216, 2017.
|
||
|
||
\bibitem{Monotonicity}
|
||
P.~Ammann, D.~Wijesekera, and S.~Kaushik, ``Scalable, graph-based network
|
||
vulnerability analysis,'' in {\em Proceedings of the 9th ACM Conference on
|
||
Computer and Communications Security}, CCS '02, (New York, NY, USA),
|
||
p.~217–224, Association for Computing Machinery, 2002.
|
||
|
||
\bibitem{TVA}
|
||
S.~Jajodia and S.~Noel, {\em Topological Vulnerability Analysis}, vol.~46,
|
||
pp.~139--154.
|
||
\newblock 09 2010.
|
||
|
||
\bibitem{louthan_hybrid_2011}
|
||
G.~Louthan, {\em Hybrid {Attack} {Graphs} for {Modeling} {Cyber}-{Physical}
|
||
{Systems}}.
|
||
\newblock PhD thesis, The {University} of {Tulsa}, 2011.
|
||
|
||
\bibitem{cook_rage_2018}
|
||
K.~Cook, {\em {RAGE}: {The} {Rage} {Attack} {Graph} {Engine}}.
|
||
\newblock PhD thesis, The {University} of {Tulsa}, 2018.
|
||
|
||
\bibitem{nichols_2018}
|
||
W.~M. Nichols, {\em {Hybrid} {Attack} {Graphs} for {Use} with a {Simulation} of
|
||
a {Cyber-Physical} {System}}.
|
||
\newblock PhD thesis, The {University} of {Tulsa}, 2018.
|
||
|
||
\end{thebibliography}
|