-
2
-
-
14844307485
-
-
S. Aubert. Idswakeup. http://www.hsc.fr/-ressources/outils/idswakeup/, 2000.
-
(2000)
Idswakeup
-
-
Aubert, S.1
-
3
-
-
1942425806
-
Vulnerability testing of software system using fault injection
-
COAST, Purdue University, West Lafayette, IN, US, April
-
W. Du and A. P. Mathur. Vulnerability Testing of Software System Using Fault Injection. Technical Report, COAST, Purdue University, West Lafayette, IN, US, April 1998.
-
(1998)
Technical Report
-
-
Du, W.1
Mathur, A.P.2
-
4
-
-
0006064357
-
Addendum to "testing and evaluating computer intrusion detection systems"
-
September
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. Addendum to "Testing and Evaluating Computer Intrusion Detection Systems". CACM, 42(9):15, September 1999.
-
(1999)
CACM
, vol.42
, Issue.9
, pp. 15
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
5
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
July
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. Testing and Evaluating Computer Intrusion Detection Systems. CACM, 42(7):53-61, July 1999.
-
(1999)
CACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
6
-
-
0025384345
-
Fault injection for dependability validation: A methodology and some applications
-
J. Arlat, M. Aguera, L. Amat, Y. Crouzet, J. Fabre, J. Laprie, E. Martins, and D. Powell. Fault Injection for Dependability Validation: A Methodology and Some Applications. IEEE Transactions on Software Engineering, 16(2):166-182, 1990.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.2
, pp. 166-182
-
-
Arlat, J.1
Aguera, M.2
Amat, L.3
Crouzet, Y.4
Fabre, J.5
Laprie, J.6
Martins, E.7
Powell, D.8
-
8
-
-
3042821266
-
Validation of Sensor alert correlators
-
January/February
-
J. Haines, D.K. Ryder, L. Tinnel, and S. Taylor. Validation of Sensor Alert Correlators. IEEE Security & Privacy Magazine, 1(1):46-56, January/February 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.1
, pp. 46-56
-
-
Haines, J.1
Ryder, D.K.2
Tinnel, L.3
Taylor, S.4
-
10
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection system
-
March
-
K. Ilgun, R.A. Kemmerer, and P.A. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
12
-
-
0029327426
-
Fault injection: A method for validating computer-system dependability
-
D. Pradhan J. Clark. Fault Injection: A Method For Validating Computer-System Dependability. IEEE Computer, 28(6):47-56, 1995.
-
(1995)
IEEE Computer
, vol.28
, Issue.6
, pp. 47-56
-
-
Pradhan, D.1
Clark, J.2
-
13
-
-
84860097203
-
-
K2. ADMmutate. http://www.ktwo.ca/security.html, 2004.
-
(2004)
K2. ADMmutate
-
-
-
14
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head, SC, January
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman. Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition, Volume 2, Hilton Head, SC, January 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.2
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
15
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
-
November
-
J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transaction on Information and System Security, 3(4), November 2000.
-
(2000)
ACM Transaction on Information and System Security
, vol.3
, Issue.4
-
-
McHugh, J.1
-
16
-
-
84860094122
-
-
Metasploit Project. Metasploit. http://www.metasploit.com/, 2004.
-
(2004)
Metasploit
-
-
-
17
-
-
84903593793
-
An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
-
Las Vegas, Nevada, December
-
D. Mutz, G. Vigna, and R.A. Kemmerer. An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. In Proceedings of the 2003 Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2003.
-
(2003)
Proceedings of the 2003 Annual Computer Security Applications Conference
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.A.3
-
18
-
-
84860102067
-
-
Neohapsis OSEC Project. Neohapsis OSEC. http://osec.neohapsis.com/, 2004.
-
(2004)
Neohapsis OSEC
-
-
-
19
-
-
35248855056
-
-
Netscape Communications Corporation. SSL 2.0 Protocol Specification. http://wp.netscape.com/eng/security/SSL.2.html, 1995.
-
(1995)
SSL 2.0 Protocol Specification
-
-
-
20
-
-
85088189436
-
-
th Edition), http://www.nss.co.uk/ips, 2004.
-
(2004)
th Edition)
-
-
-
22
-
-
84860099005
-
-
Hypertext Transfer Protocol
-
Network Working Group. Hypertext Transfer Protocol - HTTP/1.1. http://www.w3.org/Protocols/rfc2616/rfc2616.html, 1999.
-
(1999)
-
-
-
23
-
-
84860102311
-
-
Next Generation Software Security Ltd. NGSS Evaluation, http://www.nextgenss.com/, 2004.
-
(2004)
NGSS Evaluation
-
-
-
24
-
-
0004145058
-
Insertion, evasion and denial of service: Eluding network intrusion detection
-
Secure Networks, January
-
T.H. Ptacek and T.N. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical Report, Secure Networks, January 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
25
-
-
0017959155
-
Hints on test data selection: Help for the practicing programmer
-
R. J. Lipton R. A. DeMillo and F. G. Sayward. Hints on test data selection: Help for the practicing programmer. IEEE Computer, 11(4):34-43, 1978.
-
(1978)
IEEE Computer
, vol.11
, Issue.4
, pp. 34-43
-
-
Lipton, R.J.1
Demillo, R.A.2
Sayward, F.G.3
-
26
-
-
84858881738
-
Experience benchmarking intrusion detection systems
-
December
-
M. Ranum. Experience Benchmarking Intrusion Detection Systems. NFR Security White Paper, December 2001.
-
(2001)
NFR Security White Paper
-
-
Ranum, M.1
-
27
-
-
84860094956
-
-
R. Graham. SideStep. http://www.robertgraham.com/tmp/sidestep.html, 2004.
-
(2004)
SideStep
-
-
Graham, R.1
-
29
-
-
84860102540
-
-
D. Aitel. Sharefuzz. http://www.atstake.com/research/tools/ vulnerability_scanning/, 2004.
-
(2004)
Sharefuzz
-
-
Aitel, D.1
-
30
-
-
84860102559
-
-
Sniph. Snot, http://www.sec33.com/sniph/, 2001.
-
(2001)
Sniph. Snot
-
-
-
31
-
-
84860095914
-
-
D. Aitel. Spike, http://www.immunitysec.com/resources-freesoftware.shtml, 2004.
-
(2004)
Spike
-
-
Aitel, D.1
-
32
-
-
84870646285
-
-
The Apache HTTP Server Project. Apache HTTP Server, http://httpd.apache. org/, 2004.
-
(2004)
Apache HTTP Server
-
-
-
33
-
-
33748510270
-
-
The OpenSSL Project. OpenSSL. http://www.openssl.org/, 2004.
-
(2004)
OpenSSL
-
-
-
34
-
-
0012290395
-
A 'crystal ball' for software liability
-
J. Voas, G. McGraw, L. Kassab, and L. Voas. A 'Crystal Ball' for Software Liability. IEEE Computer, 30(6):29-36, 1997.
-
(1997)
IEEE Computer
, vol.30
, Issue.6
, pp. 29-36
-
-
Voas, J.1
McGraw, G.2
Kassab, L.3
Voas, L.4
|