-
1
-
-
0012169314
-
-
CERT Coordination Center, PA
-
(2002) CERT/CC Statistics 1988-2001. CERT Coordination Center, PA. [Online]. Available: http://www.cert.org/stats/cert_stats.html
-
(2002)
CERT/CC Statistics 1988-2001
-
-
-
2
-
-
0003531721
-
An analysis of security incidents on the internet 1989-1995
-
Ph.D., Carnegie Mellon University, Engineering and Public Policy
-
J. Howard, "An Analysis of Security Incidents on the Internet 1989-1995," Ph.D., Carnegie Mellon University, Engineering and Public Policy, 1997.
-
(1997)
-
-
Howard, J.1
-
3
-
-
0003976889
-
Trends in denial of service attack technology
-
Carnegie Mellon University, CERT Coordination Center
-
J. H. Houle and G. M. Weaver, "Trends in Denial of Service Attack Technology," Carnegie Mellon University, CERT Coordination Center, 2001.
-
(2001)
-
-
Houle, J.H.1
Weaver, G.M.2
-
5
-
-
0004254898
-
Quality attributes
-
Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA, CMU/SEI-95-TR-02
-
M. Barbacci, M. Klein, T. Longstaff, and C. Weinstock, "Quality Attributes," Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA, CMU/SEI-95-TR-02, 1995.
-
(1995)
-
-
Barbacci, M.1
Klein, M.2
Longstaff, T.3
Weinstock, C.4
-
6
-
-
0004141256
-
Fundamental concepts of dependability
-
A. Avizienis, J. Laprie, and B. Randell, "Fundamental concepts of dependability," in Proc. of the Information Systems Survivability Workshop, Boston, MA, 2000, pp. 7-12.
-
Proc. of the Information Systems Survivability Workshop, Boston, MA, 2000
, pp. 7-12
-
-
Avizienis, A.1
Laprie, J.2
Randell, B.3
-
7
-
-
2942734798
-
Autonomous agents for online diagnosis of a safety-critical system based on probabilistic causal reasoning
-
J. Lauber, C. Steger, and R. Weiss, "Autonomous agents for online diagnosis of a safety-critical system based on probabilistic causal reasoning," in Proc. of the 4th Int. Sym. on Autonomous Decentralized Systems, Tokyo, Japan, 1999.
-
Proc. of the 4th Int. Sym. on Autonomous Decentralized Systems, Tokyo, Japan, 1999
-
-
Lauber, J.1
Steger, C.2
Weiss, R.3
-
9
-
-
0031338486
-
Software approach to hazard detection using online analysis of safety constraints
-
B. Schroeder, K. Schwan, and S. Aggarwal, "Software approach to hazard detection using online analysis of safety constraints," in Proc. of the 16th Int. Sym. on Reliable Distributed Systems, Durham, NC, 1997, pp. 80-87.
-
Proc. of the 16th Int. Sym. on Reliable Distributed Systems, Durham, NC, 1997
, pp. 80-87
-
-
Schroeder, B.1
Schwan, K.2
Aggarwal, S.3
-
11
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Chalmers University of Technology, Dept. of Computer Engineering, Sweden, 99-15
-
S. Axelsson, "Intrusion Detection Systems: A Survey and Taxonomy," Chalmers University of Technology, Dept. of Computer Engineering, Sweden, 99-15, 2000.
-
(2000)
-
-
Axelsson, S.1
-
12
-
-
0345028807
-
Event recognition beyond signature and anomaly
-
J. Doyle, I. Kohane, W. Long, H. Shrobe, and P. Szolovits, "Event recognition beyond signature and anomaly," in Proc. of the IEEE Workshop on Information Assurance and Security, West Point, New York, 2001, pp. 17-23.
-
Proc. of the IEEE Workshop on Information Assurance and Security, West Point, New York, 2001
, pp. 17-23
-
-
Doyle, J.1
Kohane, I.2
Long, W.3
Shrobe, H.4
Szolovits, P.5
-
14
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
A. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: Alternative data models," in Proc. IEEE Sym. on Security and Privacy, 1999, pp. 133-145.
-
Proc. IEEE Sym. on Security and Privacy, 1999
, pp. 133-145
-
-
Warrender, A.1
Forrest, S.2
Pearlmutter, B.3
-
15
-
-
1942539856
-
Intrusion detection through dynamic software measurement
-
S. Elbaum and J. Munson, "Intrusion detection through dynamic software measurement," in Proc. of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, 1999, pp. 41-50.
-
Proc. of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, 1999
, pp. 41-50
-
-
Elbaum, S.1
Munson, J.2
-
16
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA, CMU/SEI-99-TR-028
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner, "State of the Practice of Intrusion Detection Technologies," Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA, CMU/SEI-99-TR-028, 1999.
-
(1999)
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
17
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head Island, SC, January
-
R. P. Lippmann et al., "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," in Proc. of the DARPA Information Survivability Conference and Exposition: DISCEX-2000, vol. 2, Hilton Head Island, SC, January 2000.
-
(2000)
Proc. of the DARPA Information Survivability Conference and Exposition: DISCEX-2000
, vol.2
-
-
Lippmann, R.P.1
-
23
-
-
0003502435
-
-
Cambridge, MA: MIT Press
-
A. Gelb, J. Kasper, R. Nash, C. Price, and A. Sutherland, Applied Optimal Estimation. Cambridge, MA: MIT Press, 1974.
-
(1974)
Applied Optimal Estimation
-
-
Gelb, A.1
Kasper, J.2
Nash, R.3
Price, C.4
Sutherland, A.5
-
26
-
-
0002679852
-
A survey of algorithmic methods for partially observable Markov decision processes
-
W. Lovejoy, "A survey of algorithmic methods for partially observable Markov decision processes," Annals of Operations Research, vol. 28, pp. 47-66, 1991.
-
(1991)
Annals of Operations Research
, vol.28
, pp. 47-66
-
-
Lovejoy, W.1
-
27
-
-
0004808420
-
On the average cost optimality equation and the structure of optimal policies for partially observable Markov decision processes
-
C. Fernandez-Gaucherand, A. Arapostathis, and S. Marcus, "On the average cost optimality equation and the structure of optimal policies for partially observable Markov decision processes," Annals of Operations Research, vol. 29, pp. 471-512, 1991.
-
(1991)
Annals of Operations Research
, vol.29
, pp. 471-512
-
-
Fernandez-Gaucherand, C.1
Arapostathis, A.2
Marcus, S.3
-
30
-
-
0031257250
-
Risk-sensitive optimal control of hidden Markov models: Structural results
-
C. Fernandez-Gaucherand and S. Marcus, "Risk-sensitive optimal control of hidden Markov models: Structural results," IEEE Trans. on Automatic Control, vol. 42, pp. 1418-1422, 1997.
-
(1997)
IEEE Trans. on Automatic Control
, vol.42
, pp. 1418-1422
-
-
Fernandez-Gaucherand, C.1
Marcus, S.2
-
31
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems," Comm. of the ACM, vol. 42, no. 7, pp. 53-61, 1999.
-
(1999)
Comm. of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
32
-
-
0034590432
-
Benchmarking anomaly-based detection systems
-
R. Maxion and K. Tan, "Benchmarking anomaly-based detection systems," in Proc. of the Inter. Conf. on Dependable Systems and Networks, New York, NY, 2000, pp. 623-630.
-
Proc. of the Inter. Conf. on Dependable Systems and Networks, New York, NY, 2000
, pp. 623-630
-
-
Maxion, R.1
Tan, K.2
-
34
-
-
84964425418
-
Statistical process control for computer intrusion detection
-
Anaheim, CA
-
N. Ye, S. Emran, X. Li, and Q. Chen, "Statistical process control for computer intrusion detection," in Proc. of the DARPA Information Survivability Conf. & Expo.: DISCEX 2001, vol. I, Anaheim, CA, 2001, pp. 3-14.
-
(2001)
Proc. of the DARPA Information Survivability Conf. & Expo.: DISCEX 2001
, vol.1
, pp. 3-14
-
-
Ye, N.1
Emran, S.2
Li, X.3
Chen, Q.4
-
35
-
-
0009516633
-
CACS-A process control approach to cyber attack detection
-
N. Ye, J. Giordano, and J. Feldman, "CACS-A process control approach to cyber attack detection," Communications of the ACM, vol. 44, no. 8, pp. 76-82, 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.8
, pp. 76-82
-
-
Ye, N.1
Giordano, J.2
Feldman, J.3
-
36
-
-
1942443723
-
New methods of intrusion detection using control-loop measurement
-
M. Cramer, J. Cannady, and J. Harrell, "New methods of intrusion detection using control-loop measurement," in 4th Technology for Information Security Conf., Houston, TX, 1996.
-
4th Technology for Information Security Conf., Houston, TX, 1996
-
-
Cramer, M.1
Cannady, J.2
Harrell, J.3
-
37
-
-
1942443724
-
Automatically synthesizing computer security control systems
-
C. Musliner, M. Pelican, W. Heimerdinger, R. Goldman, D. O'Brien, and D. Apostal, "Automatically synthesizing computer security control systems," in 13th Annual Conference on Computer Security Incident Handling, Toulouse, France, 2001.
-
13th Annual Conference on Computer Security Incident Handling, Toulouse, France, 2001
-
-
Musliner, C.1
Pelican, M.2
Heimerdinger, W.3
Goldman, R.4
O'Brien, D.5
Apostal, D.6
-
39
-
-
1942475884
-
Widespread compromises via "Ramen" toolkit
-
CERT Incident Note IN-2001-01
-
CERT Incident Note IN-2001-01, Widespread Compromises via "Ramen" Toolkit [Online]. Available: http://www.cert.org/incident_notes/IN-2001-01.html
-
-
-
-
40
-
-
1942443721
-
-
Software Systems International
-
Software Systems International [Online]. Available: http://www.soft-sysint.com
-
-
-
|