-
1
-
-
84944738739
-
Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS
-
Dec 8-12
-
Y.-S. Wu, B. Foo, Y. Mei, and S. Bagchi, "Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS", Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC), Dec 8-12, 2003.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC)
-
-
Wu, Y.-S.1
Foo, B.2
Mei, Y.3
Bagchi, S.4
-
2
-
-
0344521769
-
Case study in survivable network system analysis
-
SEI, CMU
-
R. Ellison, R. Linger, T. Longstaff, and N. Mead, "Case Study in Survivable Network System Analysis", Technical Report CMU/SEI-98-TR-014, SEI, CMU, 1998.
-
(1998)
Technical Report CMU/SEI-98-TR-014
-
-
Ellison, R.1
Linger, R.2
Longstaff, T.3
Mead, N.4
-
6
-
-
0142252989
-
-
Ph.D. Dissertation, Texas A&M U, College Station, TX
-
E. Fisch, "Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior", Ph.D. Dissertation, Texas A&M U, College Station, TX, 1996.
-
(1996)
Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior
-
-
Fisch, E.1
-
7
-
-
0142221933
-
An intrusion response taxonomy and its role in automatic intrusion response
-
USMA, West Point, NY
-
C. Carver and U. Pooch, "An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response", Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, USMA, West Point, NY, 2000.
-
(2000)
Proceedings of the 2000 IEEE Workshop on Information Assurance and Security
-
-
Carver, C.1
Pooch, U.2
-
8
-
-
0030676601
-
How to systematically classify computer security intrusions
-
Oakland, CA, May 4-7
-
U. Lindqvist and E. Jonsson, "How to Systematically Classify Computer Security Intrusions", Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, May 4-7, 1997, pp. 154-163.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
9
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
G. White, E. Fisch, and U. Pooch, "Cooperating Security Managers: A Peer-based Intrusion Detection System", IEEE Network, vol 10, no. 1, 1996, pp. 20-23.
-
(1996)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White, G.1
Fisch, E.2
Pooch, U.3
-
10
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, MD, Oct 7-10
-
P. Porras and P. Neumann, "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances," Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD, Oct 7-10, 1997, pp. 353-365.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.1
Neumann, P.2
-
11
-
-
0034499251
-
Adaptation techniques for intrusion detection and intrusion response systems
-
Nashville, Tennessee, Oct 8-11
-
D. Ragsdale, C. Carver, J. Humphries, and U. Pooch, "Adaptation Techniques for Intrusion Detection and Intrusion Response Systems", Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Nashville, Tennessee, Oct 8-11, 2000, pp. 2344-2349.
-
(2000)
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics
, pp. 2344-2349
-
-
Ragsdale, D.1
Carver, C.2
Humphries, J.3
Pooch, U.4
-
12
-
-
1242327631
-
Autonomic response to distributed denial of service attacks
-
Davis, CA, USA, Oct
-
D. Sterne, K. Djahandari, B. Wilson, B. Babson, D. Schnackenberg, H. Holliday, and T. Reid, "Autonomic Response to Distributed Denial of Service Attacks", Proceedings of the 4th International Symposium on Rapid Advances in Intrusion Detection (RAID), Davis, CA, USA, Oct 2001.
-
(2001)
Proceedings of the 4th International Symposium on Rapid Advances in Intrusion Detection (RAID)
-
-
Sterne, D.1
Djahandari, K.2
Wilson, B.3
Babson, B.4
Schnackenberg, D.5
Holliday, H.6
Reid, T.7
-
13
-
-
0003552333
-
Controlling high bandwidth aggregates in the network
-
DRAFT, Feb 5
-
R. Mahajan, S. Bellovin, S. Floyd, J. Joannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network", AT&T Center for Internet Research at ICSI (ACIRI), DRAFT, Available at http://www.research.att.com/~smb/papers/DDOS-lacc.pdf, Feb 5, 2001.
-
(2001)
AT&T Center for Internet Research at ICSI (ACIRI)
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Joannidis, J.4
Paxson, V.5
Shenker, S.6
-
14
-
-
0037903638
-
Fault trees for security system analysis and design
-
Elsevier, May
-
P. Brooke and R. Paige, "Fault Trees for Security System Analysis and Design", Journal of Computers and Security, 22(3):256-264, Elsevier, May 2003.
-
(2003)
Journal of Computers and Security
, vol.22
, Issue.3
, pp. 256-264
-
-
Brooke, P.1
Paige, R.2
-
15
-
-
0142049813
-
A software fault tree approach to requirements analysis of an intrusion detection system
-
G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, and R. Lutz, "A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System", Proceedings of the 1st Symposium on Requirements Engineering for Information Security, 2001.
-
(2001)
Proceedings of the 1st Symposium on Requirements Engineering for Information Security
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
-
17
-
-
27544456890
-
Models and tools for quantitative assessment of operational security
-
(Extended version of "Models and Tools for Quantitative Assessment of Operational Security," Proc IFIP/SEC 1996).
-
(1996)
Proc IFIP/SEC
-
-
-
18
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Sep-Oct
-
R. Ortalo, Y. Deswarte, M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security", IEEE Transactions on Software Engineering, vol 25, issue 5, pp. 633-650, Sep-Oct 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
19
-
-
84952324793
-
An active approach to characterizing dynamic dependencies for problem determination in a distributed application environment
-
A. Brown, G. Kar, A. Keller, "An Active Approach to Characterizing Dynamic Dependencies for Problem Determination in a Distributed Application Environment", IEEE/IFIP International Symposium on Integrated Network Management, pp. 377-390, 2001.
-
(2001)
IEEE/IFIP International Symposium on Integrated Network Management
, pp. 377-390
-
-
Brown, A.1
Kar, G.2
Keller, A.3
-
20
-
-
24644501682
-
Limiting uncertainty in intrusion response
-
USMA, West Point, NY, Jun 5-6
-
C. Carver, J. Hill, and U. Pooch, "Limiting Uncertainty in Intrusion Response", Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, USMA, West Point, NY, Jun 5-6, 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Carver, C.1
Hill, J.2
Pooch, U.3
|