-
2
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. In IEEE Symposium on Security and Privacy, pages 17-31, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
3
-
-
0022769976
-
Graph-based algorithms for Boolean function manipulation
-
Aug.
-
R. E. Bryant. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, Aug. 1986.
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
4
-
-
84964467772
-
Automatic management of network security policy
-
Anaheim, California, June 12-14
-
J. Burns, A. Cheng, P. Gurung, S. Rajagopalan, P. Rao, D. Rosenbluth, A. Surendran, and J. D.M. Martin. Automatic management of network security policy. In DARPA Information Survivability Conference and Exposition (DISCEX II) Volume 2, pages 1012-1026, Anaheim, California, June 12-14, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II) Volume 2
, vol.2
, pp. 1012-1026
-
-
Burns, J.1
Cheng, A.2
Gurung, P.3
Rajagopalan, S.4
Rao, P.5
Rosenbluth, D.6
Surendran, A.7
Martin, J.D.M.8
-
5
-
-
9444281043
-
ECLiPSe: An introduction
-
IC-Parc, Imperial College London
-
A. M. Cheadle, W. Harvey, A. J. Sadler, J. Schimpf, K. Shen, and M. G. Wallace. ECLiPSe: An Introduction. Technical Report IC-Parc-03-1, IC-Parc, Imperial College London, 2003.
-
(2003)
Technical Report
, vol.IC-PARC-03-1
-
-
Cheadle, A.M.1
Harvey, W.2
Sadler, A.J.3
Schimpf, J.4
Shen, K.5
Wallace, M.G.6
-
6
-
-
84860495162
-
Modeling multistep cyber attacks for scenario recognition
-
Washington, D.C., Apr. 22-24
-
rd DARPA Information Survivability Conference and Exposition (DISCEX III), pages 284-292, Washington, D.C., Apr. 22-24, 2003.
-
(2003)
rd DARPA Information Survivability Conference and Exposition (DISCEX III)
, pp. 284-292
-
-
Cheung, S.1
Lindqvist, U.2
Fong, M.W.3
-
8
-
-
0003962322
-
-
The MIT Press, Cambridge, Massachusetts
-
E. M. Clarke, O. Grumberg, and D. A. Peled. Model Checking. The MIT Press, Cambridge, Massachusetts, 1999.
-
(1999)
Model Checking
-
-
Clarke, E.M.1
Grumberg, O.2
Peled, D.A.3
-
11
-
-
20444487985
-
Finding and containing enemies within the walls with self-securing network interfaces
-
School of Computer Science, Carnegie-Mellon University, Jan.
-
G. R. Ganger, G. Economou, and S. M. Bielski. Finding and containing enemies within the walls with self-securing network interfaces. Technical Report CMU-CS-03-109, School of Computer Science, Carnegie-Mellon University, Jan. 2003.
-
(2003)
Technical Report
, vol.CMU-CS-03-109
-
-
Ganger, G.R.1
Economou, G.2
Bielski, S.M.3
-
12
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
Oakland, California, May 1997. Extended version available as MITRE technical report
-
J. D. Guttman. Filtering postures: Local enforcement for global policies. In IEEE Symposium on Security and Privacy, pages 120-129, Oakland, California, May 1997. Extended version available as MITRE technical report, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 120-129
-
-
Guttman, J.D.1
-
13
-
-
20444500759
-
Rigorous automated network security management
-
Technical report, MITRE Corp., Aug. Preliminary version appeared
-
J. D. Guttman and A. L. Herzog. Rigorous automated network security management. Technical report, MITRE Corp., Aug. 2003. Preliminary version appeared in Proc. VERIFY 2002.
-
(2003)
Proc. VERIFY 2002
-
-
Guttman, J.D.1
Herzog, A.L.2
-
14
-
-
0034449536
-
Implementing a distributed firewall
-
S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith. Implementing a distributed firewall. In ACM Conf. on Computer and Communications Security, pages 190-199, 2000.
-
(2000)
ACM Conf. on Computer and Communications Security
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.D.2
Bellovin, S.M.3
Smith, J.M.4
-
15
-
-
84964562215
-
Security at the network edge: A distributed firewall architecture
-
Anaheim, California, June 12-14
-
T. Markham and C. Payne. Security at the network edge: A distributed firewall architecture. In DARPA Information Survivability Conference and Exposition (DISCEX II) Volume 1, pages 279-286, Anaheim, California, June 12-14, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II) Volume 1
, vol.1
, pp. 279-286
-
-
Markham, T.1
Payne, C.2
-
16
-
-
0033691924
-
Fang: A firewall analysis engine
-
Oakland, California, May
-
A. Mayer, A. Wool, and E. Ziskind. Fang: A firewall analysis engine. In IEEE Symposium on Security and Privacy, pages 177-187, Oakland, California, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 177-187
-
-
Mayer, A.1
Wool, A.2
Ziskind, E.3
-
18
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc., Jan.
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., Jan. 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
19
-
-
1642293015
-
Snort: Lightweight intrusion detection for networks
-
Nov.
-
M. Roesch. Snort: Lightweight intrusion detection for networks. In USENIX LISA '99, Nov. 1999. www.snort.org.
-
(1999)
USENIX LISA '99
-
-
Roesch, M.1
-
20
-
-
20444490194
-
Intrusion tolerance and worm spread
-
IEEE, June
-
T. E. Uribe, S. Cheung, J. Levy, and A. Valdes. Intrusion tolerance and worm spread. In Fast Abstracts, Dependable Systems and Networks. IEEE, June 2003.
-
(2003)
Fast Abstracts, Dependable Systems and Networks
-
-
Uribe, T.E.1
Cheung, S.2
Levy, J.3
Valdes, A.4
|