-
4
-
-
0342602262
-
-
Feiertag, R., Kahn, C., Porras, P., Schnackenberg, D., Staniford-Chen, S., Tung, B. (1999) A Common Intrusion Specification Language (CISL). At http://gost.isi.edu/projects/crisis/cidf/cisl_current.txt
-
(1999)
A Common Intrusion Specification Language (CISL)
-
-
Feiertag, R.1
Kahn, C.2
Porras, P.3
Schnackenberg, D.4
Staniford-Chen, S.5
Tung, B.6
-
5
-
-
0029716418
-
A sense of self for UNIX processes
-
Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T. A Sense of Self for UNIX processes. Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996
-
(1996)
Proceedings of 1996 IEEE Symposium on Computer Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
7
-
-
0031190959
-
Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
-
IEEE, July-Aug. 1997
-
Guha, B.; Mukherjee, B. (1997) Network security via reverse engineering of TCP code: vulnerability analysis and proposed solutions. IEEE Network, vol. 11, (no.4), IEEE, July-Aug. 1997. p.40-8.
-
(1997)
IEEE Network
, vol.11
, Issue.4
, pp. 40-48
-
-
Guha, B.1
Mukherjee, B.2
-
8
-
-
4444230864
-
A common intrusion detection framework
-
Kahn, C., Porras, P., Staniford-Chen, S. and Tung, B.(2000) A Common Intrusion Detection Framework. Submitted to the Journal of Computer Security.
-
(2000)
Journal of Computer Security
-
-
Kahn, C.1
Porras, P.2
Staniford-Chen, S.3
Tung, B.4
-
9
-
-
84893511281
-
Tripwire: A case study in integrity monitoring
-
D. Denning and P. Denning, editors, Addison-Wesley, 1997
-
Kim, G. and Spafford, E. H. (1997) Tripwire: A Case Study in Integrity Monitoring. In D. Denning and P. Denning, editors, Interact Beseiged: Countering Cyberspace Scofflaws, Addison-Wesley, 1997.
-
(1997)
Interact Beseiged: Countering Cyberspace Scofflaws
-
-
Kim, G.1
Spafford, E.H.2
-
11
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
Ko, Calvin, Fink, George, and Levitt, Karl (1997) Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach, In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 134-144
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
13
-
-
85019504940
-
NetSTAT: A network-based intrusion detection approach
-
Scottsdale, Arizona, December 1998
-
Vigna G. and Kemmerer, R., (1998) NetSTAT: A network-based intrusion detection approach, Proceedings of the 14th Annual Computer Security Applications Conference, Scottsdale, Arizona, December 1998
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
-
-
Vigna, G.1
Kemmerer, R.2
-
14
-
-
85084161252
-
NetKuang - A multi-host configuration vulnerability checker
-
San Jose, CA. July 1996
-
Zerkle, Dan and Levitt, Karl (1996) NetKuang - A multi-host configuration vulnerability checker. In Proceedings of the 6th USENIX UNIX Security Symposium. San Jose, CA. July 1996, p. 195-2
-
(1996)
Proceedings of the 6th USENIX UNIX Security Symposium
, pp. 195-202
-
-
Zerkle, D.1
Levitt, K.2
|