-
3
-
-
0003949225
-
-
Master Thesis, Department of Computer Science, Purdue University August
-
T. Aslam, "A Taxonomy of Security Faults in Unix Operating System", Master Thesis, Department of Computer Science, Purdue University (August 1995), http://www.cs.purdue.edu/coast/coast-library.html
-
(1995)
A Taxonomy of Security Faults in Unix Operating System
-
-
Aslam, T.1
-
4
-
-
0008302889
-
-
Technical Report Department of Computer Science, Purdue University September
-
T. Aslam, I. Krsul, E. H. Spafford, "Use of a Taxonomy of Security Faults", Technical Report TR-96-051, Department of Computer Science, Purdue University (September 1996), http: //www.cs.purdue.edu/coast/coast-library.html
-
(1996)
Use of A Taxonomy of Security Faults
-
-
Aslam, T.1
Krsul, I.2
Spafford, E.H.3
-
5
-
-
0003487594
-
-
Technical Report Department of Computer Science, University of California at Davis September
-
M. Bishop, D. Bailey, "A Critical Analysis of Vulnerability Taxonomies", Technical Report CSE-96-11, Department of Computer Science, University of California at Davis (September 1996), http://seelab.cs.ucdavis.edu/papers.html
-
(1996)
A Critical Analysis of Vulnerability Taxonomies
-
-
Bishop, M.1
Bailey, D.2
-
6
-
-
33750963207
-
-
Technical Report, Information Sciences Institute, University of Southern California June
-
J. Carlstead, R. Bibsey II, F. Popek, "Pattern-directed Protection Evaluation", Technical Report, Information Sciences Institute, University of Southern California (June 1975)
-
(1975)
Pattern-Directed Protection Evaluation
-
-
Carlstead, J.1
Bibsey, R.2
Popek, F.3
-
7
-
-
0023294428
-
An intrusion detection model
-
pg. February
-
D. E. Denning, "An Intrusion Detection Model", IEEE Transactions on Software Engineering, Vol. SE-13 No. 2, pg. 222-232, (February 1987)
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
8
-
-
4444371098
-
-
Department of Computer Science, University of New Mexico
-
S. A. Hofmeyr, S. Forrest, A. Somayaji, "Intrusion Detection using Sequences of System Calls", Department of Computer Science, University of New Mexico, (1998), http://www.cs.unm.edu/-steveah/publications/ids.ps
-
(1998)
Intrusion Detection Using Sequences of System Calls
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
9
-
-
0004175084
-
-
Technical Report Department of Computer Science, University of California, Santa Barbara
-
R. A. Kemmerer, "NSTAT: A Model-based Real-time Network Intrusion Detection System", Technical Report TRCS97-18, Department of Computer Science, University of California, Santa Barbara (1997), http://www.cs.ucsb.edu/
-
(1997)
NSTAT: A Model-Based Real-Time Network Intrusion Detection System
-
-
Kemmerer, R.A.1
-
10
-
-
0003829943
-
-
Ph.D. Thesis, Department of Computer Science, University of California, Davis California
-
C. C. W. Ko, "Execution Monitoring of Security-Critical Programs in a Distributed System: A Specification-Based Approach", Ph.D. Thesis, Department of Computer Science, University of California, Davis California, (1996), http://seclab.cs.ucdavis.edu/ papers.html
-
(1996)
Execution Monitoring of Security-Critical Programs in A Distributed System: A Specification-Based Approach
-
-
Ko, C.C.W.1
-
11
-
-
0004229237
-
-
PhD Thesis, Department of Computer Science, Purdue University May
-
V. Krsul, "Software Vulnerability Analysis", PhD Thesis, Department of Computer Science, Purdue University (May 1998), http://www.cs.purdue.edu/coast/coast-library.html
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, V.1
-
13
-
-
0028514027
-
A taxonomy of computer program security flaws
-
pg. September
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, W. Choi, "A Taxonomy of Computer Program Security Flaws", ACM Computing Surveys, Vol. 26 No. 3, pg. 211-254, September 1994
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.4
-
14
-
-
0011792754
-
-
Technical Report, University of Illinois at Urbana-Champaign, December
-
B. Marick, "A Survey of Software Fault Surveys", Technical Report, UIUCDCS-R-90-1651, University of Illinois at Urbana-Champaign, December 1990
-
(1990)
A Survey of Software Fault Surveys
-
-
Marick, B.1
-
15
-
-
0028430224
-
Network intrusion detection
-
pg. May/June
-
B. Mukherjee, L. T. Heberlein, K. N. Levitt, "Network Intrusion Detection", IEEE Network, Vol. 8(3), pg. 26¬ 41, May/June 1994
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
16
-
-
0004084716
-
-
Master's thesis, Computer Science Department, University of California, Santa Barbara, June
-
P. Porras, "STAT - A State Transition Analysis Tool for Intrusion Detection." Master's thesis, Computer Science Department, University of California, Santa Barbara, June 1992.
-
(1992)
STAT - A State Transition Analysis Tool for Intrusion Detection
-
-
Porras, P.1
-
17
-
-
85053911324
-
-
Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, October
-
P.A. Porras, P.G. Neumann, "Conceptual Design and Planning for EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances", Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, (October 1997), h t t p: / / w w w . c s l . s r i . c o m / i n t r u s i o n . h t m l
-
(1997)
Conceptual Design and Planning for EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances
-
-
Porras, P.A.1
Neumann, P.G.2
-
18
-
-
85053894755
-
Quantitative aspects of software validation
-
pg. May
-
J. R. Raymond, "Quantitative Aspects of Software Validation", SIGPLAN Notices, Vol. SE-5(3), pg. 276-286 (May 1975)
-
(1975)
SIGPLAN Notices
, vol.SE-5
, Issue.3
, pp. 276-286
-
-
Raymond, J.R.1
-
20
-
-
80052341808
-
The intrusion detection system AID - Architecture, and experiences in automated audit analysis
-
September
-
M. Sobirey, B. Richter, H. Konig, "The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis", IFIP-TC6 Workshop on Communications and Multimedia Security, (September 1996).
-
(1996)
IFIP-TC6 Workshop on Communications and Multimedia Security
-
-
Sobirey, M.1
Richter, B.2
Konig, H.3
|