Evaluating damage from cyber attacks: a model and analysis (English)
- New search for: Lala, C.
- New search for: Panda, B.
- New search for: Lala, C.
- New search for: Panda, B.
In:
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
;
31
, 4
;
300-310
;
2001
- Article (Journal) / Electronic Resource
-
Title:Evaluating damage from cyber attacks: a model and analysis
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2001-07-01
-
Size:175775 byte
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 31, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 249
-
Editorial protecting the network: research directions in information assurance| 2001
- 253
-
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applicationsYong Guan, / Xinwen Fu, / Dong Xuan, / Shenoy, P.U. / Bettati, R. / Wei Zhao, et al. | 2001
- 266
-
Probabilistic techniques for intrusion detection based on computer audit dataNong Ye, / Xiangyang Li, / Qiang Chen, / Emran, S.M. / Mingming Xu, et al. | 2001
- 275
-
Detecting and displaying novel computer attacks with MacroscopeCunningham, R.K. / Lippmann, R.P. / Webster, S.E. et al. | 2001
- 282
-
On the defense of the distributed denial of service attacks: an on-off feedback control approachYong Xiong, / Liu, S. / Sun, P. et al. | 2001
- 294
-
Training a neural-network based intrusion detector to recognize novel attacksLee, S.C. / Heinbuch, D.V. et al. | 2001
- 300
-
Evaluating damage from cyber attacks: a model and analysisLala, C. / Panda, B. et al. | 2001
- 311
-
Using clustering to discover the preferences of computer criminalsBrown, D.E. / Gunderson, L.F. et al. | 2001
- 319
-
Technology challenges for virtual overlay networksBirman, K.P. et al. | 2001
- 327
-
Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systemsNash, D.A. / Ragsdale, D.J. et al. | 2001
- 331
-
DARPA Information Assurance Program dynamic defense experiment summaryKewley, D.L. / Bouchard, J.F. et al. | 2001
- 336
-
Collaboration requirements: a point of failure in protecting informationWiederhold, G. et al. | 2001