 | 2006 |
4 |  | Joseph Pamula,
Sushil Jajodia,
Paul Ammann,
Vipin Swarup:
A weakest-adversary security metric for network configuration security analysis.
QoP 2006: 31-38 |
3 |  | Joseph Pamula,
Paul Ammann,
Sushil Jajodia,
Ronald W. Ritchey:
A framework for establishing, assessing, and managing trust in inter-organizational relationships.
SWS 2006: 23-32 |
| 2005 |
2 |  | Paul Ammann,
Joseph Pamula,
Julie A. Street,
Ronald W. Ritchey:
A Host-Based Approach to Network Attack Chaining Analysis.
ACSAC 2005: 72-84 |
1 |  | Vipin Swarup,
Sushil Jajodia,
Joseph Pamula:
Rule-Based Topological Vulnerability Analysis.
MMM-ACNS 2005: 23-37 |