-
1
-
-
84867339043
-
Alert correlation in a cooperative intrusion detection framework
-
Oakland
-
Cuppens F, Miege A. Alert correlation in a cooperative intrusion detection framework. In: IEEE Symp. on Security and Privacy. Oakland, 2002. 12-15. http://ieeexplore.ieee.org/iel5/7873/21681/01004372.pdf-tp= and arnumber=1004372 and isnumber=21681
-
(2002)
IEEE Symp. on Security and Privacy
, pp. 12-15
-
-
Cuppens, F.1
Miege, A.2
-
2
-
-
33646844014
-
Statistical causality analysis of INFOSEC alert data
-
Pittsburgh
-
Qin XZ, Lee WK. Statistical causality analysis of INFOSEC alert data. In: Proc. of the 6th Int'l Symp. on Recent Advances in Intrusion Detection. Pittsburgh, 2003. 73-93. http://www.springerlink.com/media/ c5jhqhlrukegjxhpyddj/contributions/u/t/m/h/utmhwugc5lwjnfh6_html/ BodyRef/PDF/558_10953587_Chapter_5.pdf
-
(2003)
Proc. of the 6th Int'l Symp. on Recent Advances in Intrusion Detection
, pp. 73-93
-
-
Qin, X.Z.1
Lee, W.K.2
-
3
-
-
0347742772
-
Intrusion systems and multisensor data fusion: Creating cyberspace situational awareness
-
Bass T. Intrusion systems and multisensor data fusion: Creating cyberspace situational awareness. Communications of the ACM, 2000, 43(4): 99-105.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
4
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo R, Deswarte Y, Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. on Software Engineering, 1999, 25(5): 633-651.
-
(1999)
IEEE Trans. on Software Engineering
, vol.25
, Issue.5
, pp. 633-651
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
5
-
-
0036557049
-
A study of evaluation model for network security
-
Chinese source
-
Xiao DJ, Yang SJ, Zhou KF, Chen XS. A study of evaluation model for network security. Journal of Huazhong University of Science and Technology (Nature Science Edition), 2002, 30(4): 37-39 (in Chinese with English abstract).
-
(2002)
Journal of Huazhong University of Science and Technology (Nature Science Edition)
, vol.30
, Issue.4
, pp. 37-39
-
-
Xiao, D.J.1
Yang, S.J.2
Zhou, K.F.3
Chen, X.S.4
-
6
-
-
33745141365
-
Survey of information security risk assessment
-
Chinese source
-
Feng DG, Zhang Y, Zhang YQ. Survey of information security risk assessment. Journal of China Institute of Communications, 2004, 25(7): 10-18 (in Chinese with English abstract).
-
(2004)
Journal of China Institute of Communications
, vol.25
, Issue.7
, pp. 10-18
-
-
Feng, D.G.1
Zhang, Y.2
Zhang, Y.Q.3
-
7
-
-
33646686429
-
Multisensor data fusion for next generation distributed intrusion detection systems
-
Laurel
-
Bass T. Multisensor data fusion for next generation distributed intrusion detection systems. In: 1999 IRIS National Symp. on Sensor and Data Fusion. Laurel, 1999. 24-27.
-
(1999)
1999 IRIS National Symp. on Sensor and Data Fusion
, pp. 24-27
-
-
Bass, T.1
-
8
-
-
84964490701
-
Security situation assessment and response evaluation
-
Anaheirn
-
D'Ambrosio B, Takikawa M, Upper D, Fitzgerald J, Mahoney S. Security situation assessment and response evaluation. In: DARPA Information Survivability Conf. and Exposition II. Anaheirn, 2001. 387-394. http://ieeexplore.ieee.org/iel5/7418/20170/00932233.pdf-tp= and arnumber=932233 and isnumber=20170
-
(2001)
DARPA Information Survivability Conf. and Exposition II
, pp. 387-394
-
-
D'Ambrosio, B.1
Takikawa, M.2
Upper, D.3
Fitzgerald, J.4
Mahoney, S.5
-
10
-
-
4544270125
-
Impact analysis of faults and attacks in large-scale networks
-
Hariri S, Qu GZ, Dharmagadda T, et al. Impact analysis of faults and attacks in large-scale networks. IEEE Security and Privacy, 2003, 1(5): 49-54.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.5
, pp. 49-54
-
-
Hariri, S.1
Gu, G.Z.2
Dharmagadda, T.3
-
11
-
-
33745123491
-
Managing network security attack and defense strategies
-
Cohen F. Managing network security attack and defense strategies. 2004. http://www.blacksheepnetworks.com/security/info/misc/9907.html
-
(2004)
-
-
Cohen, F.1
-
12
-
-
0346336040
-
Footprinting for intrusion detection and threat assessment
-
Blyth A. Footprinting for intrusion detection and threat assessment. Information Security Technical Report, 1999, 4(3): 43-53.
-
(1999)
Information Security Technical Report
, vol.4
, Issue.3
, pp. 43-53
-
-
Blyth, A.1
-
14
-
-
84958970105
-
The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
-
Zurich
-
Lippmann R, Webster S, Stetson D. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In: Proc. of the 15th Int'l Symp. on Recent Advances in Intrusion Detection. Zurich, 2002. 307-326. http://www.springerlink.com/media/320e3xk18j1vuwbe6k1p/ contributions/w/2/6/5/w265fm4f77n2nm7a.pdf
-
(2002)
Proc. of the 15th Int'l Symp. on Recent Advances in Intrusion Detection
, pp. 307-326
-
-
Lippmann, R.1
Webster, S.2
Stetson, D.3
-
16
-
-
35449000276
-
Snort users manual, snort release 2.0.0
-
Roesch M, Green C. Snort users manual, snort release 2.0.0. 2003. http://www.snort.org/docs/SnortUsersManual.pdf
-
(2003)
-
-
Roesch, M.1
Green, C.2
-
17
-
-
33745148044
-
A framework for network vulnerability analysis
-
Qu GZ, Pakash J, Kishore R, Hariri S. A framework for network vulnerability analysis. 2003. http://www.ece.arizona.edu/-hpdc/projects/nvat/NV-framework.pdf
-
(2003)
-
-
Qu, G.Z.1
Pakash, J.2
Kishore, R.3
Hariri, S.4
-
18
-
-
33745120982
-
Know your enemy: Statistics
-
Project H. Know your enemy: Statistics. 2002. http://www.honeynet.org/papers/stats/
-
(2002)
-
-
Project, H.1
-
19
-
-
33745167835
-
-
Project H. Scan 17
-
Project H. Scan 17. 2002. http://www.honeynet.org/scans/scan17/
-
(2002)
-
-
-
20
-
-
33745172942
-
Serv-U FTP directory traversal vulnerability
-
TM
-
TM. Serv-U FTP directory traversal vulnerability. 2003. http://www.securityfocus.com/bid/2052
-
(2003)
-
-
|