Description  Claims  Drawing  Cited references 

WO2007027131A   [0013] 

Speculative attacks with multiple target   [0003] 
combined attacks and countermeasures   [0003] 
To infinity and beyond: Combined attack on ECC using points of low order   [0003] 
Network vulnerability to single; multiple and probabilistic physical attacks   [0003] 
Optimization of cost-based threat response for security information and event management systems   [0005]  [0099] 
Mitigate security risks by minimizing the code you expose to untrusted users   [0008] 
Measuring relative arrack surfaces   [0008] 
Measuring the attack surfaces of two FTP daemons   [0009] 
An attack surface metric   [0009] 
IMS threat and attack surface analysis using common vulnerability scoring system (CVSS)   [0011] 
Windows Vista Network Attack Surface Analysis: A broad overview, Symantec, Advance Threat Research   [0012] 
Microsoft releases attack surface analyzer tool   [0012] 
A service dependency model for cost-sensitive intrusion response   [0016] 
Management of service dependencies and intrusion and reaction impacts   [0021] 
Uniform Resource Identifier (URI)   [0027] 
DOD Standard Internet Protocol   [0028] 
Updated Specification of the IPv4 ID Field   [0028] 
Internet assigned numbers authority (IANA) procedures for the management of the service name and transport protocol port number registry   [0028] 
Internet Protocol, Version 6(IPv6)   [0028] 
Service name and transport protocol port number registry   [0028] 
Individual countermeasure selection based on the return on response investment index   [0037] 
Combination approach to select optimal countermeasures based on the RORI index   [0037] 
RORI-based countermeasure selection using the OrBAC formalism   [0037] 
Risk analysis and security countermeasure selection   [0048] 
Special operations forces intelligence and electronic warfare operation, Appendix D: Target analysis process   [0048] 
A Service Dependency Model for Cost-Sensitive Intrusion Response   [0096] 
Response Policies and Countermeasures: Management of Service Dependencies and Intrusion and Reaction Impacts   [0096] 
Response Policies and Countermeasures: Management of Service Dependencies and Intrusion and Reaction Impacts   [0097] 
Return On Security Investment (ROSI) - A Practical Quantitative Model   [0097]