Steven Noel
Steven Noel
Cybersecurity Researcher, The MITRE Corporation
ยืนยันอีเมลแล้วที่ mitre.org - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’Berry
Managing Cyber Threats: Issues, Approaches and Challenges, 247-266, 2005
5672005
Efficient minimum-cost network hardening via exploit dependency graphs
S Noel, S Jajodia, B O'Berry, M Jacobs
19th Annual Computer Security Applications Conference, 2003. Proceedings., 86-95, 2003
3582003
Managing Attack Graph Complexity Through Visual Hierarchical Aggregation
S Noel, S Jajodia
Proceedings of the ACM Workshop on Visualization and Data Mining for …, 2004
3212004
Minimum-cost network hardening using attack graphs
L Wang, S Noel, S Jajodia
Computer Communications 29 (18), 3812-3824, 2006
3192006
Correlating intrusion events and building attack scenarios through attack graph distances
S Noel, E Robertson, S Jajodia
20th Annual Computer Security Applications Conference, 350-359, 2004
2072004
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
L Wang, S Jajodia, A Singhal, P Cheng, S Noel
IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2013
1552013
Multiple coordinated views for network attack graphs
S Noel, M Jacobs, P Kalapa, S Jajodia
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 99-106, 2005
1542005
Understanding complex network attack graphs through clustered adjacency matrices
S Noel, S Jajodia
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-169, 2005
1512005
Measuring security risk of networks using attack graphs
S Noel, S Jajodia, L Wang, A Singhal
International Journal of Next-Generation Computing 1 (1), 135-147, 2010
1462010
Cauldron mission-centric cyber situational awareness with defense in depth
S Jajodia, S Noel, P Kalapa, M Albanese, J Williams
2011-MILCOM 2011 Military Communications Conference, 1339-1344, 2011
1342011
Representing TCP/IP connectivity for topological analysis of network security
R Ritchey, B O'Berry, S Noel
18th Annual Computer Security Applications Conference, 2002. Proceedings., 25-31, 2002
1342002
Modern intrusion detection, data mining, and degrees of attack guilt
S Noel, D Wijesekera, C Youman
Applications of data mining in computer security, 1-31, 2002
1282002
Time-efficient and cost-effective network hardening using attack graphs
M Albanese, S Jajodia, S Noel
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
1232012
Topological vulnerability analysis
S Jajodia, S Noel
Cyber situational awareness, 139-154, 2010
1122010
Optimal ids sensor placement and alert prioritization using attack graphs
S Noel, S Jajodia
Journal of Network and Systems Management 16 (3), 259-275, 2008
1092008
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
L Wang, S Jajodia, A Singhal, S Noel
European Symposium on Research in Computer Security, 573-587, 2010
1052010
Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response
S Jajodia, S Noel
Algorithms, architectures and information systems security, 285-305, 2009
862009
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
852009
CyGraph: graph-based analytics and visualization for cybersecurity
S Noel, E Harley, KH Tam, M Limiero, M Share
Handbook of Statistics 35, 117-167, 2016
662016
Recent results in wavelet applications
I Daubechies
Journal of Electronic Imaging 7 (4), 1998
661998
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20