-
2
-
-
85015336184
-
Intelligent agents for intrusion detection
-
Syracuse, NY, September
-
Helmer G, Wong JSK, Honavar V, Miller L. Intelligent agents for intrusion detection. In: Proceedings, IEEE information technology conference, Syracuse, NY, September 1998, pp 121-124
-
(1998)
Proceedings, IEEE Information Technology Conference
, pp. 121-124
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
-
3
-
-
0003577306
-
-
Bradshaw JM (ed). MIT Press, Cambridge, MA
-
Bradshaw JM (ed). An introduction to software agents. MIT Press, Cambridge, MA, 1997
-
(1997)
An Introduction to Software Agents
-
-
-
5
-
-
0029309598
-
Analyzing safety requirements for process-control systems
-
De Lemos R, Saeed A, Anderson T. Analyzing safety requirements for process-control systems. IEEE Software 1995;12(3):42-53
-
(1995)
IEEE Software
, vol.12
, Issue.3
, pp. 42-53
-
-
De Lemos, R.1
Saeed, A.2
Anderson, T.3
-
6
-
-
0031499162
-
Requirements analysis using forward and backward search
-
Lutz R, Woodhouse RM. Requirements analysis using forward and backward search. Ann Software Eng 1997;3:459-475
-
(1997)
Ann Software Eng
, vol.3
, pp. 459-475
-
-
Lutz, R.1
Woodhouse, R.M.2
-
9
-
-
0026188075
-
Safety verification of Ada programs using software fault trees
-
Leveson NG, Cha SS, Shimeall TJ. Safety verification of Ada programs using software fault trees. IEEE Software 1991;8(4):48-59
-
(1991)
IEEE Software
, vol.8
, Issue.4
, pp. 48-59
-
-
Leveson, N.G.1
Cha, S.S.2
Shimeall, T.J.3
-
10
-
-
0030231447
-
Targeting safety-related errors during software requirements analysis
-
Lutz RR. Targeting safety-related errors during software requirements analysis. J Syst Software 1996;34:223-230
-
(1996)
J Syst Software
, vol.34
, pp. 223-230
-
-
Lutz, R.R.1
-
12
-
-
0003774222
-
-
McGraw-Hill Engineering and Technology Management Series. McGraw-Hill, New York
-
Raheja DG. Assurance technologies: principles and practices. McGraw-Hill Engineering and Technology Management Series. McGraw-Hill, New York, 1991
-
(1991)
Assurance Technologies: Principles and Practices
-
-
Raheja, D.G.1
-
13
-
-
84992414199
-
Combining various solution techniques for dynamic fault tree analysis of computer systems
-
IEEE Computer Society
-
Manian R, Dugan JB, Coppit D, Sullivan KJ. Combining various solution techniques for dynamic fault tree analysis of computer systems. In: Third IEEE international high-assurance systems engineering symposium, IEEE Computer Society, 1998, pp 21-28
-
(1998)
Third IEEE International High-assurance Systems Engineering Symposium
, pp. 21-28
-
-
Manian, R.1
Dugan, J.B.2
Coppit, D.3
Sullivan, K.J.4
-
15
-
-
0031640906
-
Abstraction-based misuse detection: High-level specifications and adaptable strategies
-
Rockport, MA, June
-
Lin J-L, Wang XS, Jajodia S. Abstraction-based misuse detection: high-level specifications and adaptable strategies. In: Proceedings, IEEE computer security foundations workshop, Rockport, MA, June 1998, pp 190-201
-
(1998)
Proceedings, IEEE Computer Security Foundations Workshop
, pp. 190-201
-
-
Lin, J.-L.1
Wang, X.S.2
Jajodia, S.3
-
16
-
-
0002028280
-
A pattern matching model for misuse intrusion detection
-
Baltimore, MD, October
-
Kumar S, Spafford EH. A pattern matching model for misuse intrusion detection. In: Proceedings of the 17th national computer security conference, Baltimore, MD, October 1994, pp 11-21
-
(1994)
Proceedings of the 17th National Computer Security Conference
, pp. 11-21
-
-
Kumar, S.1
Spafford, E.H.2
-
23
-
-
85077751063
-
-
Online July
-
CERT Coordination Center. Two input validation problems in FTPD. Online at http://www.cert.org/advisories/CA-2000-13.html [July 2000]
-
(2000)
Two Input Validation Problems in FTPD
-
-
-
24
-
-
52649126844
-
-
Online December
-
CERT Coordination Center. FTP bounce. Online at http:// www.cert.org/advisories/CA-97.27.FTP_bounce.html [December 1997]
-
(1997)
FTP Bounce
-
-
-
25
-
-
84891562697
-
Fault detectability analysis for requirements validation of fault tolerant systems
-
IEEE Computer Society
-
Del Gobbo D, Cukic B, Napolitano MR, Easterbrook S. Fault detectability analysis for requirements validation of fault tolerant systems. In: Fourth IEEE international high-assurance systems engineering symposium, IEEE Computer Society, 1999, pp 231-238
-
(1999)
Fourth IEEE International High-assurance Systems Engineering Symposium
, pp. 231-238
-
-
Del Gobbo, D.1
Cukic, B.2
Napolitano, M.R.3
Easterbrook, S.4
-
26
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Puketza NJ, Zhang K, Chung M, Mukherjee B, Olsson RA. A methodology for testing intrusion detection systems. IEEE Trans Software Eng 1996;22(10):719-729
-
(1996)
IEEE Trans Software Eng
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
|