Steven Noel
Steven Noel
Cybersecurity Researcher, The MITRE Corporation
Verified email at - Homepage
Cited by
Cited by
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’Berry
Managing Cyber Threats: Issues, Approaches and Challenges, 247-266, 2005
Efficient minimum-cost network hardening via exploit dependency graphs
S Noel, S Jajodia, B O'Berry, M Jacobs
19th Annual Computer Security Applications Conference, 2003. Proceedings., 86-95, 2003
Managing Attack Graph Complexity Through Visual Hierarchical Aggregation
S Noel, S Jajodia
Proceedings of the ACM Workshop on Visualization and Data Mining for …, 2004
Minimum-cost network hardening using attack graphs
L Wang, S Noel, S Jajodia
Computer Communications 29 (18), 3812-3824, 2006
Correlating intrusion events and building attack scenarios through attack graph distances
S Noel, E Robertson, S Jajodia
20th Annual Computer Security Applications Conference, 350-359, 2004
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
L Wang, S Jajodia, A Singhal, P Cheng, S Noel
IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2013
Measuring security risk of networks using attack graphs
S Noel, S Jajodia, L Wang, A Singhal
International Journal of Next-Generation Computing 1 (1), 135-147, 2010
Multiple coordinated views for network attack graphs
S Noel, M Jacobs, P Kalapa, S Jajodia
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 99-106, 2005
Understanding complex network attack graphs through clustered adjacency matrices
S Noel, S Jajodia
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-169, 2005
Cauldron mission-centric cyber situational awareness with defense in depth
S Jajodia, S Noel, P Kalapa, M Albanese, J Williams
2011-MILCOM 2011 Military Communications Conference, 1339-1344, 2011
CyGraph: graph-based analytics and visualization for cybersecurity
S Noel, E Harley, KH Tam, M Limiero, M Share
Handbook of Statistics 35, 117-167, 2016
Time-efficient and cost-effective network hardening using attack graphs
M Albanese, S Jajodia, S Noel
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
Optimal ids sensor placement and alert prioritization using attack graphs
S Noel, S Jajodia
Journal of Network and Systems Management 16, 259-275, 2008
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
L Wang, S Jajodia, A Singhal, S Noel
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
Topological vulnerability analysis
S Jajodia, S Noel
Cyber situational awareness: Issues and research, 139-154, 2009
Representing TCP/IP connectivity for topological analysis of network security
R Ritchey, B O'Berry, S Noel
18th Annual Computer Security Applications Conference, 2002. Proceedings., 25-31, 2002
Modern intrusion detection, data mining, and degrees of attack guilt
S Noel, D Wijesekera, C Youman
Applications of data mining in computer security, 1-31, 2002
Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response
S Jajodia, S Noel
Algorithms, architectures and information systems security, 285-305, 2009
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
System and method for visualizing and analyzing cyber-attacks using a graph model
S Noel, E Harley, KH Tam, M Limiero, M Share
US Patent 10,313,382, 2019
The system can't perform the operation now. Try again later.
Articles 1–20