-
2
-
-
12144276864
-
Timing the application of security patches for optimal uptime
-
November
-
Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright. Timing the application of security patches for optimal uptime. In LISA XVI, November 2002.
-
(2002)
LISA XVI
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
-
4
-
-
21844455349
-
-
Byacc. http://dickey.his.com/byacc/byacc.html.
-
-
-
-
7
-
-
21844434512
-
-
November
-
Microsoft Security Bulletin MS01-033, November 2003. http://www. microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/ MS01-033.asp.
-
(2003)
Microsoft Security Bulletin MS01-033
-
-
-
8
-
-
21844458763
-
-
Microsoft Corp. URLScan Security Tool.http://www.microsoft.com/technet/ security/URLScan.asp.
-
URLScan Security Tool
-
-
-
9
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Crispin Cowan, Calton Pu, Dave Maier, Heather Hintony, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of 7th USENIX Security Conference, 1998.
-
(1998)
Proceedings of 7th USENIX Security Conference
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
10
-
-
28044442580
-
HoneyStat: LocalWorm detection using honeypots
-
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian Grizzard, John Levine, and Henry Owen. HoneyStat: LocalWorm Detection Using Honeypots. In RAID, 2004.
-
(2004)
RAID
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
12
-
-
0003415244
-
-
June
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext Transfer Protocol -HTTP/1.1 (RFC 2616), June 1999.
-
(1999)
Hypertext Transfer Protocol -HTTP/1.1 (RFC)
, vol.2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
14
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
August
-
Mark Handley, Vern Paxson, and Christian Kreibich. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In Proceedings of USENIX Security Symposium, August 2001.
-
(2001)
Proceedings of USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
15
-
-
0036948858
-
A transport layer approach for achieving aggregate bandwidths on multi-homed mobile hosts
-
September
-
Hung-Yun Hsieh and Raghupathy Sivakumar. A transport layer approach for achieving aggregate bandwidths on multi-homed mobile hosts. In ACM Mobicom, September 2002.
-
(2002)
ACM Mobicom
-
-
Hsieh, H.-Y.1
Sivakumar, R.2
-
18
-
-
33646048960
-
Honeycomb: Creating intrusion detection signatures using honeypots
-
C. Kreibich and J. Crowcroft. Honeycomb: Creating Intrusion Detection Signatures Using Honeypots. In HotNets-II, 2003.
-
(2003)
HotNets-II
-
-
Kreibich, C.1
Crowcroft, J.2
-
21
-
-
2642524006
-
PacketTypes: Abstract specification of network protocol messages
-
P. J. McCann and S. Chandra. PacketTypes: Abstract Specification of Network Protocol Messages. In Proceedings of ACM SIGCOMM, 2000.
-
(2000)
Proceedings of ACM SIGCOMM
-
-
McCann, P.J.1
Chandra, S.2
-
22
-
-
21844442909
-
-
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver. Inside the Slammer Worm. http://www.computer. org/security/v1n4/j4wea.htm, 2003.
-
(2003)
Inside the Slammer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
24
-
-
2342553315
-
-
September
-
Microsoft Security Bulletin MS03-026, September 2003. http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ bulletin/MS03-026.asp.
-
(2003)
Microsoft Security Bulletin MS03-026
-
-
-
27
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Dec
-
Vern Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Computer Networks, Dec 1999.
-
(1999)
Computer Networks
-
-
Paxson, V.1
-
31
-
-
8644246187
-
A virtual honeypot framework
-
Center for Information Technology Integration, University of Michigan, October
-
Niels Provos. A Virtual Honeypot Framework. Technical Report CITI-03-1, Center for Information Technology Integration, University of Michigan, October 2003.
-
(2003)
Technical Report
, vol.CITI-03-1
-
-
Provos, N.1
-
35
-
-
21844451704
-
-
April
-
W32.Sasser.Worm, April 2004. http://securityresponse.symantec.com/ avcenter/venc/data/w32.sasser.worm.html.
-
(2004)
W32.Sasser.Worm
-
-
-
39
-
-
14844309952
-
The EarlyBird system for real-time detection of unknown worms
-
University of California at San Diego
-
Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage. The EarlyBird System for Real-time Detection of Unknown Worms. Technical Report CS2003-0761, University of California at San Diego, 2003.
-
(2003)
Technical Report
, vol.CS2003-0761
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
40
-
-
21844439815
-
-
January
-
Microsoft security bulletin ms02-039, January 2003. http://www.microsoft. com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-039.asp.
-
(2003)
Microsoft Security Bulletin Ms02-039
-
-
-
44
-
-
0002946830
-
A first step towards automated detection of buffer overrun vulnerabilities
-
David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. In NDSS, 2000.
-
(2000)
NDSS
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
48
-
-
4243483478
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
HP Labs Bristol
-
Matthew M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. Technical Report HPL-2002-172, HP Labs Bristol, 2002.
-
(2002)
Technical Report
, vol.HPL-2002-172
-
-
Williamson, M.M.1
|