Steven Noel
Steven Noel
Cybersecurity Researcher, The MITRE Corporation
Verified email at mitre.org - Homepage
TitleCited byYear
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’Berry
Managing Cyber Threats: Issues, Approaches and Challenges, 247-266, 2005
5102005
Efficient minimum-cost network hardening via exploit dependency graphs
S Noel, S Jajodia, B O'Berry, M Jacobs
19th Annual Computer Security Applications Conference, 2003. Proceedings., 86-95, 2003
3192003
Managing Attack Graph Complexity Through Visual Hierarchical Aggregation
S Noel, S Jajodia
Proceedings of the ACM Workshop on Visualization and Data Mining for …, 2004
2912004
Minimum-cost network hardening using attack graphs
L Wang, S Noel, S Jajodia
Computer Communications 29 (18), 3812-3824, 2006
2812006
Correlating intrusion events and building attack scenarios through attack graph distances
S Noel, E Robertson, S Jajodia
20th Annual Computer Security Applications Conference, 350-359, 2004
1972004
Understanding complex network attack graphs through clustered adjacency matrices
S Noel, S Jajodia
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-169, 2005
1492005
Representing TCP/IP connectivity for topological analysis of network security
R Ritchey, B O'Berry, S Noel
18th Annual Computer Security Applications Conference, 2002. Proceedings., 25-31, 2002
1282002
Modern intrusion detection, data mining, and degrees of attack guilt
S Noel, D Wijesekera, C Youman
Applications of data mining in computer security, 1-31, 2002
1232002
Multiple coordinated views for network attack graphs
S Noel, M Jacobs, P Kalapa, S Jajodia
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 99-106, 2005
1222005
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
L Wang, S Jajodia, A Singhal, P Cheng, S Noel
IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2013
1172013
Measuring security risk of networks using attack graphs
S Noel, S Jajodia, L Wang, A Singhal
International Journal of Next-Generation Computing 1 (1), 135-147, 2010
1142010
Cauldron mission-centric cyber situational awareness with defense in depth
S Jajodia, S Noel, P Kalapa, M Albanese, J Williams
2011-MILCOM 2011 Military Communications Conference, 1339-1344, 2011
1072011
Time-efficient and cost-effective network hardening using attack graphs
M Albanese, S Jajodia, S Noel
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
1062012
Optimal ids sensor placement and alert prioritization using attack graphs
S Noel, S Jajodia
Journal of Network and Systems Management 16 (3), 259-275, 2008
872008
Topological vulnerability analysis
S Jajodia, S Noel
Cyber situational awareness, 139-154, 2010
862010
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
L Wang, S Jajodia, A Singhal, S Noel
European Symposium on Research in Computer Security, 573-587, 2010
852010
Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response
S Jajodia, S Noel
Algorithms, architectures and information systems security, 285-305, 2009
722009
Advances in topological vulnerability analysis
S Noel, M Elder, S Jajodia, P Kalapa, S O'Hare, K Prole
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
672009
Recent results in wavelet applications
I Daubechies
Journal of Electronic Imaging 7 (4), 1998
621998
Minimum-cost network hardening
SE Noel, S Jajodia, BC O'berry, MA Jacobs
US Patent 7,555,778, 2009
522009
The system can't perform the operation now. Try again later.
Articles 1–20