-
7
-
-
0027694889
-
A bayesian model of plan recognition
-
E. Charniak and R. Goldman. A bayesian model of plan recognition. Artificial Intelligence, 64(1):53-79, 1993.
-
(1993)
Artificial Intelligence
, vol.64
, Issue.1
, pp. 53-79
-
-
Charniak, E.1
Goldman, R.2
-
8
-
-
0005006587
-
Beyond question answering
-
W. Lehnert and M. Ringle, editors
-
P. Cohen, C. Perrault, and J. Allen. Beyond question answering. In W. Lehnert and M. Ringle, editors, Strategies for Natural Language Processing, pages 245-274. 1981.
-
(1981)
Strategies for Natural Language Processing
, pp. 245-274
-
-
Cohen, P.1
Perrault, C.2
Allen, J.3
-
15
-
-
85169413860
-
Reasoning about adversarial intent in asymmetric situations
-
North Falmouth, Massachusetts
-
J. Eilbert, D. Carmody, D. Fu, T. Santarelli, D. Wischusen, and J. Donmoyer. Reasoning about adversarial intent in asymmetric situations. In In Proceedings of the AAAI Fall Symposium on Intent Inference for Users, Teams, and Adversaries, North Falmouth, Massachusetts, 2002.
-
(2002)
Proceedings of the AAAI Fall Symposium on Intent Inference for Users, Teams, and Adversaries
-
-
Eilbert, J.1
Carmody, D.2
Fu, D.3
Santarelli, T.4
Wischusen, D.5
Donmoyer, J.6
-
19
-
-
84948760464
-
Two formal analysis of attack graphs
-
Nova Scotia, Canada
-
S. Jha, O. Sheyner, and J.Wing. Two formal analysis of attack graphs. In Computer Security Foundations Workshop (CSFW), pages 49-63, Nova Scotia, Canada, 2002.
-
(2002)
Computer Security Foundations Workshop (CSFW)
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
23
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In IEEE Symposium on Security and Privacy, pages 175-187, 1987.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
24
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, pages 558-565, 1978.
-
(1978)
Communications of the ACM
, pp. 558-565
-
-
Lamport, L.1
-
25
-
-
0032630098
-
Detecting computer and network misuse through the production-based expert system toolset (p-best)
-
Oakland, California
-
U. Lindqvist and P. Porras. Detecting computer and network misuse through the production-based expert system toolset (p-best). In Proceedings of the 1999 IEEE Symposium on Security: and Privacy, pages 146-161, Oakland, California, 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.2
-
26
-
-
84860924611
-
-
Information-technology promotion agency, Japan
-
Linux Security Module. Information-technology promotion agency, Japan, http://www.ipa.go.jp/stc/ida/download.html, 2003.
-
(2003)
Linux Security Module
-
-
-
28
-
-
79958186026
-
Building attack scenarios through integration of complementary alert correlation methods
-
P. Ning, D.Xu, C. Healey, and R. Amant. Building attack scenarios through integration of complementary alert correlation methods. In in Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), pages 97-111, 2004.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04)
, pp. 97-111
-
-
Ning, P.1
Xu, D.2
Healey, C.3
Amant, R.4
-
34
-
-
84860935029
-
-
Restore Exploit. http://www.securiteam.com/exploits/6u0061f0ak.html, 2004.
-
(2004)
Restore Exploit
-
-
-
35
-
-
0002670359
-
Attack trees: Modelling security threats
-
December
-
B. Schneier. Attack trees: Modelling security threats. Dr. Dobb's Journal, December, 1999.
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
36
-
-
17644387396
-
-
Honeypot Technologies Inc. Personal communication
-
L. Spitzner. Honeypot Technologies Inc. Personal communication, 2003.
-
(2003)
-
-
Spitzner, L.1
-
38
-
-
17644384237
-
Sun security and auditing
-
November
-
Sun Microsystem. Sun Security and Auditing, SunSHIELD Basic Security Module, November 1993.
-
(1993)
SunSHIELD Basic Security Module
-
-
|