RE: Taxonomy of attacks?

From: Lodin, Steven {DI~Basel Dia} (STEVEN.LODIN@Roche.COM)
Date: Thu Aug 21 2003 - 06:09:07 EDT


There are a few Ph.D thesis papers on this topic at COAST/CERIAS
(http://www.cerias.purdue.edu/). Those will contain references to other
papers.

https://www.cerias.purdue.edu/techreports-ssl/public/97-05.pdf

Also, consider using this search critera at Google

vulnerability taxonomy attack krsul

Kind regards,

Steve Lodin, CISSP
Roche Diagnostics
Head of Global IT Security
Office +41-61-688-4738
Mobile +41-79-770-9717

---------------------------------------------------------------------------
Attend Black Hat Briefings & Training Federal, September 29-30 (Training), October 1-2 (Briefings) in Tysons Corner, VA; the world<92>s premier
technical IT security event. Modeled after the famous Black Hat event in
Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors.
Symanetc is the Diamond sponsor. Early-bird registration ends September 6 Visit: www.blackhat.com
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:38 EDT