메뉴 건너뛰기




Volumn Part F133431, Issue , 1999, Pages 378-387

A process state-transition analysis and its application to intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS;

EID: 0005946780     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.1999.816050     Document Type: Conference Paper
Times cited : (12)

References (21)
  • 3
    • 0003949225 scopus 로고
    • Master Thesis, Department of Computer Science, Purdue University August
    • T. Aslam, "A Taxonomy of Security Faults in Unix Operating System", Master Thesis, Department of Computer Science, Purdue University (August 1995), http://www.cs.purdue.edu/coast/coast-library.html
    • (1995) A Taxonomy of Security Faults in Unix Operating System
    • Aslam, T.1
  • 4
    • 0008302889 scopus 로고    scopus 로고
    • Technical Report Department of Computer Science, Purdue University September
    • T. Aslam, I. Krsul, E. H. Spafford, "Use of a Taxonomy of Security Faults", Technical Report TR-96-051, Department of Computer Science, Purdue University (September 1996), http: //www.cs.purdue.edu/coast/coast-library.html
    • (1996) Use of A Taxonomy of Security Faults
    • Aslam, T.1    Krsul, I.2    Spafford, E.H.3
  • 5
    • 0003487594 scopus 로고    scopus 로고
    • Technical Report Department of Computer Science, University of California at Davis September
    • M. Bishop, D. Bailey, "A Critical Analysis of Vulnerability Taxonomies", Technical Report CSE-96-11, Department of Computer Science, University of California at Davis (September 1996), http://seelab.cs.ucdavis.edu/papers.html
    • (1996) A Critical Analysis of Vulnerability Taxonomies
    • Bishop, M.1    Bailey, D.2
  • 6
    • 33750963207 scopus 로고
    • Technical Report, Information Sciences Institute, University of Southern California June
    • J. Carlstead, R. Bibsey II, F. Popek, "Pattern-directed Protection Evaluation", Technical Report, Information Sciences Institute, University of Southern California (June 1975)
    • (1975) Pattern-Directed Protection Evaluation
    • Carlstead, J.1    Bibsey, R.2    Popek, F.3
  • 7
    • 0023294428 scopus 로고
    • An intrusion detection model
    • pg. February
    • D. E. Denning, "An Intrusion Detection Model", IEEE Transactions on Software Engineering, Vol. SE-13 No. 2, pg. 222-232, (February 1987)
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 9
    • 0004175084 scopus 로고    scopus 로고
    • Technical Report Department of Computer Science, University of California, Santa Barbara
    • R. A. Kemmerer, "NSTAT: A Model-based Real-time Network Intrusion Detection System", Technical Report TRCS97-18, Department of Computer Science, University of California, Santa Barbara (1997), http://www.cs.ucsb.edu/
    • (1997) NSTAT: A Model-Based Real-Time Network Intrusion Detection System
    • Kemmerer, R.A.1
  • 11
    • 0004229237 scopus 로고    scopus 로고
    • PhD Thesis, Department of Computer Science, Purdue University May
    • V. Krsul, "Software Vulnerability Analysis", PhD Thesis, Department of Computer Science, Purdue University (May 1998), http://www.cs.purdue.edu/coast/coast-library.html
    • (1998) Software Vulnerability Analysis
    • Krsul, V.1
  • 13
    • 0028514027 scopus 로고
    • A taxonomy of computer program security flaws
    • pg. September
    • C. E. Landwehr, A. R. Bull, J. P. McDermott, W. Choi, "A Taxonomy of Computer Program Security Flaws", ACM Computing Surveys, Vol. 26 No. 3, pg. 211-254, September 1994
    • (1994) ACM Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1    Bull, A.R.2    McDermott, J.P.3    Choi, W.4
  • 14
    • 0011792754 scopus 로고
    • Technical Report, University of Illinois at Urbana-Champaign, December
    • B. Marick, "A Survey of Software Fault Surveys", Technical Report, UIUCDCS-R-90-1651, University of Illinois at Urbana-Champaign, December 1990
    • (1990) A Survey of Software Fault Surveys
    • Marick, B.1
  • 15
    • 0028430224 scopus 로고
    • Network intrusion detection
    • pg. May/June
    • B. Mukherjee, L. T. Heberlein, K. N. Levitt, "Network Intrusion Detection", IEEE Network, Vol. 8(3), pg. 26¬ 41, May/June 1994
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 18
    • 85053894755 scopus 로고
    • Quantitative aspects of software validation
    • pg. May
    • J. R. Raymond, "Quantitative Aspects of Software Validation", SIGPLAN Notices, Vol. SE-5(3), pg. 276-286 (May 1975)
    • (1975) SIGPLAN Notices , vol.SE-5 , Issue.3 , pp. 276-286
    • Raymond, J.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.