-
2
-
-
0032218204
-
Model checking of hierarchical state machines
-
Lake Buena Vista, FL, Nov.
-
R. Alur and M. Yannakakis. Model checking of hierarchical state machines. In Foundations of Software Engineering, Lake Buena Vista, FL, Nov. 1998.
-
(1998)
Foundations of Software Engineering
-
-
Alur, R.1
Yannakakis, M.2
-
3
-
-
27544471466
-
-
Syngress, 2 edition, May
-
A. R. Baker, Barnyard, B. Caswell, M. Poor, R. Alder, J. Babbin, J. Beale, A. Doxtater, J. C. Foster, T. Kohlenberg, and M. Rash. Snort 2.1 Intrusion Detection. Syngress, 2 edition, May 2004.
-
(2004)
Snort 2.1 Intrusion Detection
-
-
Baker, A.R.1
Barnyard2
Caswell, B.3
Poor, M.4
Alder, R.5
Babbin, J.6
Beale, J.7
Doxtater, A.8
Foster, J.C.9
Kohlenberg, T.10
Rash, M.11
-
5
-
-
84861256733
-
-
BlackMoon Inc. BlackMoon FTP Server. Available at www.blackmoonftpserver. com.
-
BlackMoon FTP Server
-
-
-
7
-
-
4544359276
-
-
IBM Zurich Research Laboratory, Aug. Deliverable D10, Project MAFTIA IST-1999-11583
-
M. Dacier, editor. Design of an Intrusion-Tolerant Intrusion Detection System. IBM Zurich Research Laboratory, Aug. 2002. Deliverable D10, Project MAFTIA IST-1999-11583, Available at www.maftia.org.
-
(2002)
Design of an Intrusion-tolerant Intrusion Detection System
-
-
Dacier, M.1
-
8
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S. T. Eckmann, G. Vigna, and R. A. Kemmerer. STATL: An attack language for state-based intrusion detection. J. Computer Security, 10(1/2), 2002.
-
(2002)
J. Computer Security
, vol.10
, Issue.1-2
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
10
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Washington, DC, Aug.
-
M. Handley and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In USENIX Security Symposium, Washington, DC, Aug. 2001.
-
(2001)
USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
-
12
-
-
0003620778
-
-
Addison-Wesley, 2 edition
-
J. Hopcroft, R. Motwani, and J. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2 edition, 2001.
-
(2001)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
13
-
-
23944438303
-
Finite-state error/edit-systems and difference-measures for languages and words
-
Saint Mary's University Department of Mathematics and Computing Science
-
L. Kari, S. Konstantinidis, S. Perron, G. Wozniak, and J. Xu. Finite-state error/edit-systems and difference-measures for languages and words. Technical Report 2003_001, Saint Mary's University Department of Mathematics and Computing Science, 2003.
-
(2003)
Technical Report
, vol.2003
, Issue.1
-
-
Kari, L.1
Konstantinidis, S.2
Perron, S.3
Wozniak, G.4
Xu, J.5
-
14
-
-
0012249167
-
Analysis and results of the 1999 DARPA off-line intrusion detection evaluation
-
Toulouse, France, Oct.
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. Analysis and results of the 1999 DARPA off-line intrusion detection evaluation. In International Symposium on Recent Advances in Intrusion Detection, Toulouse, France, Oct. 2000.
-
(2000)
International Symposium on Recent Advances in Intrusion Detection
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
16
-
-
33745180019
-
ADeLe: An attack description language for knowledge-based intrusion detection
-
Paris, France, June
-
C. Michel and L. Mé. ADeLe: An attack description language for knowledge-based intrusion detection. In International Conference on Information Security, Paris, France, June 2001.
-
(2001)
International Conference on Information Security
-
-
Michel, C.1
Mé, L.2
-
19
-
-
84903593793
-
An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
-
Las Vegas, NV, Dec.
-
D. Mutz, G. Vigna, and R. A. Kemmerer. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems. In Annual Computer Security Applications Conference, Las Vegas, NV, Dec. 2003.
-
(2003)
Annual Computer Security Applications Conference
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.A.3
-
21
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Dec.
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23/24), Dec. 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
-
-
Paxson, V.1
-
24
-
-
33847105800
-
Formal specification of intrusion signatures and detection rules
-
Nova Scotia, Canada, June
-
J.-P. Pouzol and M. Ducassé. Formal specification of intrusion signatures and detection rules. In IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2002.
-
(2002)
IEEE Computer Security Foundations Workshop
-
-
Pouzol, J.-P.1
Ducassé, M.2
-
25
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc., Calgary, Alberta, Canada
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical Report T2R-0Y6, Secure Networks, Inc., Calgary, Alberta, Canada, 1998.
-
(1998)
Technical Report
, vol.T2R-0Y6
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
27
-
-
21644443817
-
Automatic generation and analysis of NIDS attacks
-
Tucson, AZ, Dec.
-
S. Rubin, S. Jha, and B. P. Miller. Automatic generation and analysis of NIDS attacks. In Annual Computer Security Applications Conference, Tucson, AZ, Dec. 2004.
-
(2004)
Annual Computer Security Applications Conference
-
-
Rubin, S.1
Jha, S.2
Miller, B.P.3
-
29
-
-
0033280865
-
A high-performance network intrusion detection system
-
Singapore, Nov.
-
R. Sekar, Y. Guang, S. Verma, and T. Shanbhag. A high-performance network intrusion detection system. In ACM Conference on Computer and Communications Security, Singapore, Nov. 1999.
-
(1999)
ACM Conference on Computer and Communications Security
-
-
Sekar, R.1
Guang, Y.2
Verma, S.3
Shanbhag, T.4
-
30
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
Washington, DC, Aug.
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In USENIX Security Symposium, Washington, DC, Aug. 1999.
-
(1999)
USENIX Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
34
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
G. Vigna and R. A. Kemmerer. NetSTAT: A Network-based Intrusion Detection System. J. Computer Security, 7(1), 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.1
-
-
Vigna, G.1
Kemmerer, R.A.2
-
35
-
-
14844322335
-
Testing network-based intrusion detection signatures using mutant exploits
-
Washington, DC, Oct.
-
G. Vigna, W. Robertson, and D. Balzarotti. Testing network-based intrusion detection signatures using mutant exploits. In ACM Conference on Computer and Communications Security, Washington, DC, Oct. 2004.
-
(2004)
ACM Conference on Computer and Communications Security
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
|