-
2
-
-
0742276097
-
Inside the slammer worm
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. Security and Privacy 1 (2003) 33-39
-
(2003)
Security and Privacy
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
4
-
-
33745653694
-
-
Maftia deliverable d2, LAAS-CNRS
-
Adelsbach, A., Cachin, C., Creese, S., Deswarte, Y., Kursawe, K., Laprie, J.C., Pfitzmann, B., Powell, D., Randell, B., Riodan, J., Stroud, R.J., Veríssimo, P., Waidner, M., Welch, I.: MAFTIA conceptual model and architecture. Maftia deliverable d2, LAAS-CNRS (2001)
-
(2001)
MAFTIA Conceptual Model and Architecture.
-
-
Adelsbach, A.1
Cachin, C.2
Creese, S.3
Deswarte, Y.4
Kursawe, K.5
Laprie, J.C.6
Pfitzmann, B.7
Powell, D.8
Randell, B.9
Riodan, J.10
Stroud, R.J.11
Veríssimo, P.12
Waidner, M.13
Welch, I.14
-
5
-
-
31344455537
-
An adaptive intrusion-tolerant server architecture
-
Cambridge, U.K.
-
Valdes, A., Almgren, M., Cheung, S., Deswarte, Y., Dutertre, B., Levy, J., Saïdi, H., Stravidou, V., Uribe, T.E.: An adaptive intrusion-tolerant server architecture. In: Proceedings of the 10th International Workshop on Security Protocols, Cambridge, U.K. (2002)
-
(2002)
Proceedings of the 10th International Workshop on Security Protocols
-
-
Valdes, A.1
Almgren, M.2
Cheung, S.3
Deswarte, Y.4
Dutertre, B.5
Levy, J.6
Saïdi, H.7
Stravidou, V.8
Uribe, T.E.9
-
6
-
-
2642547091
-
Learning unknown attacks - A start
-
Zurich, Switzerland
-
Just, J., Reynolds, J., Clough, L., Danforth, M., Levitt, K., Maglich, R., Rowe, J.: Learning Unknown Attacks - A Start. In: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland (2002)
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
-
-
Just, J.1
Reynolds, J.2
Clough, L.3
Danforth, M.4
Levitt, K.5
Maglich, R.6
Rowe, J.7
-
9
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
IEEE Computer Society Press
-
Ko, C., Fink, G., Levitt, K.: Automated detection of vulnerabilities in privileged programs by execution monitoring. In: Proceedings of the 10th Annual Computer Security Applications Conference, IEEE Computer Society Press (1994) 134-144
-
(1994)
Proceedings of the 10th Annual Computer Security Applications Conference
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
10
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Oakland, CA
-
Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A fast automaton-based method for detecting anomalous program behaviors. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA (2001) 144-155
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
11
-
-
0021471901
-
Fault tolerance by design diversity: Concepts and experiments
-
Avizienis, A., Kelly, J.P.J.: Fault tolerance by design diversity: Concepts and experiments. IEEE Computer (1984) 67-80
-
(1984)
IEEE Computer
, pp. 67-80
-
-
Avizienis, A.1
Kelly, J.P.J.2
-
13
-
-
0025457846
-
Definition and analysis of hardware-and-software fault-tolerant architectures
-
Laprie, J.C., Arlat, J., Béounes, C., Kanoun, K.: Definition and analysis of hardware-and-software fault-tolerant architectures. IEEE Computer 23 (1990) 39-51
-
(1990)
IEEE Computer
, vol.23
, pp. 39-51
-
-
Laprie, J.C.1
Arlat, J.2
Béounes, C.3
Kanoun, K.4
-
14
-
-
0017792448
-
On the implementation of n-version programming for sotware fault tolerance during execution
-
Avizienis, A., Chen, L.: On the implementation of n-version programming for sotware fault tolerance during execution. In: Proceedings of the IEEE COMPSAC 77. (1977) 149-155
-
(1977)
Proceedings of the IEEE COMPSAC 77
, pp. 149-155
-
-
Avizienis, A.1
Chen, L.2
-
15
-
-
0027607062
-
Improving the N-version programming process through the evolution of a design paradigm
-
Lyu, M., He, Y.: Improving the N-version programming process through the evolution of a design paradigm. IEEE Transactions on Reliability 42 (1993) 179-189
-
(1993)
IEEE Transactions on Reliability
, vol.42
, pp. 179-189
-
-
Lyu, M.1
He, Y.2
-
16
-
-
84864840163
-
-
On Designing Dependable Services with Diverse Off-The-Shelf SQL Servers. Springer-Verlag
-
Gashi, I., Popov, P., Stankovic, V., Strigìni, L. In: On Designing Dependable Services with Diverse Off-The-Shelf SQL Servers. Volume 3069 of Lecture Notes in Computer Science. Springer-Verlag (2004) 196-220
-
(2004)
Lecture Notes in Computer Science
, vol.3069
, pp. 196-220
-
-
Gashi, I.1
Popov, P.2
Stankovic, V.3
Strigìni, L.4
-
17
-
-
13944254856
-
Design and implementation of acceptance monitor for building scalable intrusion tolerant system
-
Phoenix, Arizona
-
Wang, R., Wang, F., Byrd, G.T.: Design and implementation of acceptance monitor for building scalable intrusion tolerant system. In: Proceedings of the 10th International Conference on Computer Communications and Networks, Phoenix, Arizona (2001) 200-5
-
(2001)
Proceedings of the 10th International Conference on Computer Communications and Networks
, pp. 200-205
-
-
Wang, R.1
Wang, F.2
Byrd, G.T.3
-
18
-
-
2642529568
-
An intrusion tolerant architecture for dynamic content internet servers
-
Liu, P., Pal, P., eds., Fairfax, VA, ACM Press
-
Saidane, A., Deswarte, Y., Nicomette, V.: An intrusion tolerant architecture for dynamic content internet servers. In Liu, P., Pal, P., eds.: Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems (SSRS-03), Fairfax, VA, ACM Press (2003) 110-114
-
(2003)
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems (SSRS-03)
, pp. 110-114
-
-
Saidane, A.1
Deswarte, Y.2
Nicomette, V.3
-
19
-
-
21644481499
-
A serial combination of anomaly and misuse idses applied to http traffic
-
Tombini, E., Debar, H., Mé, L., Ducassé, M.: A serial combination of anomaly and misuse idses applied to http traffic. In: Proceedings of ACSAC'2004. (2004)
-
(2004)
Proceedings of ACSAC'2004
-
-
Tombini, E.1
Debar, H.2
Mé, L.3
Ducassé, M.4
-
20
-
-
33745664048
-
Webanalyzer: Accurate and fast detection of http attack traces in web server logs
-
Malta
-
Debar, H., Tombini, E.: Webanalyzer: Accurate and fast detection of http attack traces in web server logs. In: Proceedings of EICAR, Malta (2005)
-
(2005)
Proceedings of EICAR
-
-
Debar, H.1
Tombini, E.2
-
21
-
-
62349108537
-
A stateful intrusion detection system for world-wide web servers
-
Las Vegas, NV
-
Vigna, G., Robertson, W., Kher, V., Kemmerer, R.: A stateful intrusion detection system for world-wide web servers. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003), Las Vegas, NV (2003) 34-43
-
(2003)
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003)
, pp. 34-43
-
-
Vigna, G.1
Robertson, W.2
Kher, V.3
Kemmerer, R.4
-
22
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
Seattle, WA
-
Roesch, M.: Snort - lightweight intrusion detection for networks. In: 13th Administration Conference, LISA'99, Seattle, WA (1999)
-
(1999)
13th Administration Conference, LISA'99
-
-
Roesch, M.1
|