![DBLP keys DBLP keys](../../../keys.gif) | 2006 |
4 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Joseph Pamula,
Sushil Jajodia,
Paul Ammann,
Vipin Swarup:
A weakest-adversary security metric for network configuration security analysis.
QoP 2006: 31-38 |
3 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Joseph Pamula,
Paul Ammann,
Sushil Jajodia,
Ronald W. Ritchey:
A framework for establishing, assessing, and managing trust in inter-organizational relationships.
SWS 2006: 23-32 |
| 2005 |
2 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Paul Ammann,
Joseph Pamula,
Julie A. Street,
Ronald W. Ritchey:
A Host-Based Approach to Network Attack Chaining Analysis.
ACSAC 2005: 72-84 |
1 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Vipin Swarup,
Sushil Jajodia,
Joseph Pamula:
Rule-Based Topological Vulnerability Analysis.
MMM-ACNS 2005: 23-37 |