-
1
-
-
33646863377
-
"A multi-disciplinary approach to countering insider threats"
-
Buffalo, NY, Sep
-
R. DelZoppo, E. Browns, M. Downey, E. D. Liddy, S. Symonenko, and J. S. Park et al., "A multi-disciplinary approach to countering insider threats," in Proc. Secure Knowledge Management Workshop, Buffalo, NY, Sep. 2004, pp. 221-226.
-
(2004)
Proc. Secure Knowledge Management Workshop
, pp. 221-226
-
-
DelZoppo, R.1
Browns, E.2
Downey, M.3
Liddy, E.D.4
Symonenko, S.5
Park, J.S.6
-
2
-
-
84898088402
-
"Secure knowledge management"
-
D. Swartz, Ed. Hershey, PA: Iden Group
-
S. Upadhyaya, H. R. Rao, and G. Padmanabhan, "Secure knowledge management," in Encyclopedia of Knowledge Management, D. Swartz, Ed. Hershey, PA: Iden Group, 2005, pp. 795-801.
-
(2005)
Encyclopedia of Knowledge Management
, pp. 795-801
-
-
Upadhyaya, S.1
Rao, H.R.2
Padmanabhan, G.3
-
4
-
-
9744248703
-
"Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues"
-
Mar
-
M. Alavi and D. E. Leidner, "Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues," MIS Q., vol. 25, no. 1, pp. 107-136, Mar. 2001.
-
(2001)
MIS Q.
, vol.25
, Issue.1
, pp. 107-136
-
-
Alavi, M.1
Leidner, D.E.2
-
5
-
-
0032377899
-
"The eleven deadliest sins of knowledge management"
-
L. Fahey and L. Prusak, "The eleven deadliest sins of knowledge management," Calif. Manage. Rev., vol. 40, no. 3, pp. 265-276, 1998.
-
(1998)
Calif. Manage. Rev.
, vol.40
, Issue.3
, pp. 265-276
-
-
Fahey, L.1
Prusak, L.2
-
6
-
-
0034188780
-
"Balancing act: How to capture knowledge without killing it"
-
May/Jun
-
J. S. Brown and P. Duguid, "Balancing act: How to capture knowledge without killing it," Harvard Bus. Rev., vol. 78, no. 3, pp. 73-80, May/Jun. 2000.
-
(2000)
Harvard Bus. Rev.
, vol.78
, Issue.3
, pp. 73-80
-
-
Brown, J.S.1
Duguid, P.2
-
7
-
-
0037253062
-
"The vision of autonomic computing"
-
Jan
-
J. Kephart and D. Chess, "The vision of autonomic computing," Computer, vol. 36, no. 1, pp. 41-50, Jan. 2003.
-
(2003)
Computer
, vol.36
, Issue.1
, pp. 41-50
-
-
Kephart, J.1
Chess, D.2
-
8
-
-
33646872977
-
"Autonomic computing blueprint unveiled"
-
P. MacInnis, "Autonomic computing blueprint unveiled," Comput. Canada, vol. 29, no. 8, p. 4, 2003.
-
(2003)
Comput. Canada
, vol.29
, Issue.8
, pp. 4
-
-
MacInnis, P.1
-
9
-
-
0037233184
-
"Autonomic computing: The next e-business step"
-
J. Teresko, "Autonomic computing: The next e-business step," Ind. Week, vol. 252, no. 1, p. 19, 2003.
-
(2003)
Ind. Week
, vol.252
, Issue.1
, pp. 19
-
-
Teresko, J.1
-
10
-
-
9944238300
-
"Towards autonomic computing systems"
-
H. Tianfield and R. Unland, "Towards autonomic computing systems," Eng. Appl. Artif. Intell., vol. 17, no. 7, pp. 689-699, 2004.
-
(2004)
Eng. Appl. Artif. Intell.
, vol.17
, Issue.7
, pp. 689-699
-
-
Tianfield, H.1
Unland, R.2
-
11
-
-
0037236310
-
"Autonomic personal computing"
-
D. F. Bantz, C. Bisdikian, D. Challener, J. P. Karidis, S. Mastrianni, A. Mohindra et al. "Autonomic personal computing," IBM Syst. J., vol. 42, no. 1, pp. 165-176, 2003.
-
(2003)
IBM Syst. J.
, vol.42
, Issue.1
, pp. 165-176
-
-
Bantz, D.F.1
Bisdikian, C.2
Challener, D.3
Karidis, J.P.4
Mastrianni, S.5
Mohindra, A.6
-
12
-
-
4544301052
-
"An architectural approach to autonomic computing"
-
S. R. White, J. E. Hanson, I. Whalley, D. M. Chess, and J. O. Kephart, "An architectural approach to autonomic computing," in Proc. IEEE Int. Conf. Autonomic Computing, 2004, pp. 2-9.
-
(2004)
Proc. IEEE Int. Conf. Autonomic Computing
, pp. 2-9
-
-
White, S.R.1
Hanson, J.E.2
Whalley, I.3
Chess, D.M.4
Kephart, J.O.5
-
14
-
-
4544296157
-
"The role of ontologies in autonomic computing systems"
-
L. Stojanovic, J. Schneider, A. Maedche, S. Libischer, R. Studer, T. Lumpp et al., "The role of ontologies in autonomic computing systems," IBM Syst. J., vol. 43, no. 3, pp. 598-617, 2004.
-
(2004)
IBM Syst. J.
, vol.43
, Issue.3
, pp. 598-617
-
-
Stojanovic, L.1
Schneider, J.2
Maedche, A.3
Libischer, S.4
Studer, R.5
Lumpp, T.6
-
15
-
-
0037232265
-
"Security in an autonomic computing environment"
-
D. M. Chess, C. C. Palmer, and S. R. White, "Security in an autonomic computing environment," IBM Syst. J., vol. 42, no. 1, pp. 107-118, 2003.
-
(2003)
IBM Syst. J.
, vol.42
, Issue.1
, pp. 107-118
-
-
Chess, D.M.1
Palmer, C.C.2
White, S.R.3
-
16
-
-
33646870936
-
"Denial of service intrusion detection using time dependent deterministic finite automata"
-
Troy, NY, Oct
-
J. Branch, A. Bivens, C. Y. Chan, T. K. Lee, and B. Szymanski, "Denial of service intrusion detection using time dependent deterministic finite automata," in Proc. Research Conf., Troy, NY, Oct. 2002, pp. 45-51.
-
(2002)
Proc. Research Conf.
, pp. 45-51
-
-
Branch, J.1
Bivens, A.2
Chan, C.Y.3
Lee, T.K.4
Szymanski, B.5
-
17
-
-
0004048154
-
"Computer security threat and monitoring surveillance"
-
James P. Anderson Co., FortWashington, PA, Tech. Rep. 79F26400
-
J. P. Anderson, "Computer security threat and monitoring surveillance," James P. Anderson Co., FortWashington, PA, Tech. Rep. 79F26400, 1980.
-
(1980)
-
-
Anderson, J.P.1
-
18
-
-
84928016636
-
"The base-rate fallacy and the difficulty of intrusion detection"
-
Aug
-
S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection," ACM Trans. Inf. Syst. Secur., vol. 3, no. 3, pp. 186-205, Aug. 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
19
-
-
35248836533
-
"Using specification-based intrusion detection for automated response"
-
Pittsburgh, PA, Sep. 8-10
-
I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, "Using specification-based intrusion detection for automated response," in Proc. 6th Int. Symp. RAID, Pittsburgh, PA, Sep. 8-10, 2003, pp. 136-154.
-
(2003)
Proc. 6th Int. Symp. RAID
, pp. 136-154
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.4
-
20
-
-
0036093229
-
"Toward cost-sensitive modeling for intrusion detection and response"
-
W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok, "Toward cost-sensitive modeling for intrusion detection and response," J. Comput. Secur., vol. 10, no. 1, pp. 5-22, 2002.
-
(2002)
J. Comput. Secur.
, vol.10
, Issue.1
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.4
Zadok, E.5
-
21
-
-
0003907293
-
-
Indianapolis, IN: Macmillan
-
R. Bace, Intrusion Detection. Indianapolis, IN: Macmillan, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
23
-
-
85084164032
-
"Automated response using system call delays"
-
Aug. 14-17
-
A. Somayaji and S. Forrest, "Automated response using system call delays," in Proc. 9th USENIX Security Symp., Aug. 14-17, 2000, pp. 185-198.
-
(2000)
Proc. 9th USENIX Security Symp.
, pp. 185-198
-
-
Somayaji, A.1
Forrest, S.2
-
24
-
-
84990029315
-
"The economics of information security investment"
-
Nov
-
L. A. Gordon and M. P. Loeb, "The economics of information security investment," ACM Trans. Inf. Syst. Secur., vol. 5, no. 4, pp. 438-457, Nov. 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
25
-
-
4243109556
-
"A model for evaluating IT security systems"
-
Jul
-
H. Cavusoglu, B. K. Mishra, and S. Raghunathan, "A model for evaluating IT security systems," Commun. ACM, vol. 47, no. 7, pp. 87-92, Jul. 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.K.2
Raghunathan, S.3
-
26
-
-
18944385964
-
"The value of intrusion detection systems in information technology security architectures"
-
Mar
-
H. Cavusoglu, B. K. Mishra, and S. Raghunathan, "The value of intrusion detection systems in information technology security architectures," Inf. Syst. Res., vol. 16, no. 1, pp. 28-46, Mar. 2005.
-
(2005)
Inf. Syst. Res.
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.K.2
Raghunathan, S.3
-
27
-
-
14344258545
-
"Incentive-based modeling and inference of attacker intent, objectives, and strategies"
-
P. Liu and W. Zang, "Incentive-based modeling and inference of attacker intent, objectives, and strategies," in Proc. 10th ACM Conf. Computer Communications Security, 2003, pp. 179-189.
-
(2003)
Proc. 10th ACM Conf. Computer Communications Security
, pp. 179-189
-
-
Liu, P.1
Zang, W.2
-
28
-
-
0042474230
-
"Detecting network intrusions via sampling: A game theoretic approach"
-
[Online]. Available: www.ieee-infocom.org/2003/papers/46_02.PDF
-
M. Kodialam and T. V. Lakshman. (2003). "Detecting network intrusions via sampling: A game theoretic approach," in Proc. IEEE INFOCOM. [Online]. Available: www.ieee-infocom.org/2003/papers/46_02.PDF
-
(2003)
Proc. IEEE INFOCOM
-
-
Kodialam, M.1
Lakshman, T.V.2
-
29
-
-
18144409187
-
"Selfish behavior and stability of the Internet: A game-theoretic analysis of TCP"
-
Pittsburgh, PA, Aug
-
A. Akella, S. Seshan, R. Karp, and S. Shenker, "Selfish behavior and stability of the Internet: A game-theoretic analysis of TCP," in Proc. ACM SIGCOMM, Pittsburgh, PA, Aug. 2002, pp. 117-130.
-
(2002)
Proc. ACM SIGCOMM
, pp. 117-130
-
-
Akella, A.1
Seshan, S.2
Karp, R.3
Shenker, S.4
-
30
-
-
0029533860
-
"Making greed work in networks: A game-theoretic analysis of switch service disciplines"
-
Dec
-
S. Shenker, "Making greed work in networks: A game-theoretic analysis of switch service disciplines," IEEE/ACM Trans. Netw., vol. 3, no. 6, pp. 819-831, Dec. 1995.
-
(1995)
IEEE/ACM Trans. Netw.
, vol.3
, Issue.6
, pp. 819-831
-
-
Shenker, S.1
-
32
-
-
84966620150
-
"Testing and evaluating computer intrusion detection systems"
-
Jul
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems," Commun. ACM, vol. 42, no. 7, pp. 53-61, Jul. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
33
-
-
84962260018
-
"Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation"
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung et al., "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," in Proc. DISCEX, 2000, vol. 2, pp. 12-26.
-
(2000)
Proc. DISCEX
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
-
34
-
-
2942524129
-
"Evaluating clustering techniques for network intrusion detection"
-
Las Vegas, NV, Aug
-
S. Zhong, T. M. Khoshgoftaar, and N. Seliya, "Evaluating clustering techniques for network intrusion detection," in Proc. 10th ISSAT Int. Conf. Reliability Quality Design, Las Vegas, NV, Aug. 2004, pp. 149-155.
-
(2004)
Proc. 10th ISSAT Int. Conf. Reliability Quality Design
, pp. 149-155
-
-
Zhong, S.1
Khoshgoftaar, T.M.2
Seliya, N.3
-
35
-
-
35048885009
-
"Anomalous payload-based network intrusion detection"
-
Sep
-
K. Wang and S. Stolfo, "Anomalous payload-based network intrusion detection," in Proc. RAID, Sep. 2004, pp. 203-222.
-
(2004)
Proc. RAID
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.2
-
37
-
-
2742611322
-
"Deterrence and the design of treaty verification systems"
-
Sep./Oct
-
S. Weissenberger, "Deterrence and the design of treaty verification systems," IEEE Trans. Syst., Man, Cybern., vol. 22, no. 5, pp. 903-915, Sep./Oct. 1992.
-
(1992)
IEEE Trans. Syst., Man, Cybern.
, vol.22
, Issue.5
, pp. 903-915
-
-
Weissenberger, S.1
-
38
-
-
0001936936
-
"Strategic considerations in auditing"
-
Oct
-
J. C. Fellingham and P. Newman, "Strategic considerations in auditing," Account. Rev., vol. 60, no. 4, pp. 634-650, Oct. 1985.
-
(1985)
Account. Rev.
, vol.60
, Issue.4
, pp. 634-650
-
-
Fellingham, J.C.1
Newman, P.2
-
39
-
-
27644551591
-
"Corporate software piracy prevention and detection: An analysis of strategies"
-
B. Mishra, T. S. Raghu, and A. Prasad, "Corporate software piracy prevention and detection: An analysis of strategies," J. Organ. Comput. Electron. Commer., vol. 15, no. 3, pp. 223-252, 2005.
-
(2005)
J. Organ. Comput. Electron. Commer.
, vol.15
, Issue.3
, pp. 223-252
-
-
Mishra, B.1
Raghu, T.S.2
Prasad, A.3
-
40
-
-
0034270431
-
"Defending yourself: The role of intrusion detection systems"
-
Sep./Oct
-
J. McHugh, A. C. Christie, and J. Allen, "Defending yourself: The role of intrusion detection systems," IEEE Softw., vol. 17, no. 5, pp. 42-51, Sep./Oct. 2000.
-
(2000)
IEEE Softw.
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.C.2
Allen, J.3
-
41
-
-
27644518674
-
"Optimal redundancy allocation for information technology disaster recovery in the network economy"
-
Jul./Sep
-
B. Shao, "Optimal redundancy allocation for information technology disaster recovery in the network economy," IEEE Trans. Dependable Secure Comput., vol. 2, no. 3, pp. 262-267, Jul./Sep. 2005.
-
(2005)
IEEE Trans. Dependable Secure Comput.
, vol.2
, Issue.3
, pp. 262-267
-
-
Shao, B.1
-
42
-
-
0035195320
-
"An analytical framework for reasoning about intrusions"
-
New Orleans, LA, Oct
-
S. Upadhyaya, R. Chinchani, and K. Kwiat, "An analytical framework for reasoning about intrusions," in Proc. IEEE Symp. Reliable Distributed Systems, New Orleans, LA, Oct. 2001, pp. 99-108.
-
(2001)
Proc. IEEE Symp. Reliable Distributed Systems
, pp. 99-108
-
-
Upadhyaya, S.1
Chinchani, R.2
Kwiat, K.3
|