-
2
-
-
84948979531
-
Evaluating the impact of automated intrusion response mechanisms
-
Las Vegas, NV, IEEE Computer Society Press
-
Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, IEEE Computer Society Press (2002)
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC)
-
-
Toth, T.1
Kruegel, C.2
-
4
-
-
33847254542
-
Inappropriate tcp resets considered harmful
-
rfc3360
-
rfc3360: Inappropriate tcp resets considered harmful. RFC 3360 (2002) http://www.ietf.org/rfc/rfc3360.txt.
-
(2002)
RFC
, vol.3360
-
-
-
5
-
-
4944234105
-
Selecting appropriate counter-measures in an intrusion detection framework
-
Pacific Grove, CA
-
Cuppens, F., Gombault, S., Sans, T.: Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. In: 17th IEEE Computer Security Foundations Workshop (CSFW), Pacific Grove, CA (2004)
-
(2004)
17th IEEE Computer Security Foundations Workshop (CSFW)
-
-
Cuppens, F.1
Gombault, S.2
Sans, T.3
-
7
-
-
0034499251
-
Adaptation techniques for intrusion detection and intrusion response system
-
Nashville, TN, IEEE Computer Society Press
-
Ragsdale, D., Carver, C., Humphries, J., Pooch, U.: Adaptation techniques for intrusion detection and intrusion response system. In: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Nashville, TN, IEEE Computer Society Press (2000) 2344-2349
-
(2000)
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics
, pp. 2344-2349
-
-
Ragsdale, D.1
Carver, C.2
Humphries, J.3
Pooch, U.4
-
8
-
-
24644501682
-
Limiting uncertainty in intrusion response
-
United States Military Academy, West Point, NY
-
Carver, C., Hill, J., Pooch, U.: Limiting uncertainty in intrusion response. In: Proceedings of the 2001 IEEE workshop on Information Assurance and Security, United States Military Academy, West Point, NY (2001)
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Carver, C.1
Hill, J.2
Pooch, U.3
-
9
-
-
0016984825
-
Protection in operating systems
-
Harrison, M.A., Ruzzo, W.L, Ullman, J.D.; Protection in Operating Systems. Communication of the ACM 19(8) (1976) 461-471
-
(1976)
Communication of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
10
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2) (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
33746441974
-
Inheritance hierarchies in the Or-BAC Model and application in a network environment
-
Turku, Finland
-
Cuppens, F., Cuppens-Boulahia, N., Miège, A.: Inheritance hierarchies in the Or-BAC Model and application in a network environment. In: Second Foundations of Computer Security Workshop (FCS'04), Turku, Finland (2004)
-
(2004)
Second Foundations of Computer Security Workshop (FCS'04)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Miège, A.3
-
15
-
-
33751017347
-
A formal approach to specify and deploy a network security policy
-
Toulouse, France
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miège, A.: A Formal Approach to Specify and Deploy a Network Security Policy. In: Formal Aspects of Security and Trust (FAST), Toulouse, France (2004)
-
(2004)
Formal Aspects of Security and Trust (FAST)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Miège, A.4
-
16
-
-
0004225165
-
The intrusion detection message exchange format
-
Work in progress, expires July 31st, 2005
-
Debar, H., Curry, D., Feinstein, B.: The intrusion detection message exchange format. Internet Draft (2005) Work in progress, expires July 31st, 2005.
-
(2005)
Internet Draft
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
19
-
-
1542281004
-
M2D2: A formal data model for IDS alert correlation
-
Morin, B., Mé, L., Debar, H., Ducassé, M.: M2D2: A Formal Data Model for IDS Alert Correlation. In: Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID). (2002)
-
(2002)
Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
21
-
-
84941156689
-
Administration model for Or-BAC
-
Catania, Sicily, Italy
-
Cuppens, F., Miège, A.: Administration Model for Or-BAC. In: International Federated Conferences (OTM'03), Workshop on Metadata for Security, Catania, Sicily, Italy (2003)
-
(2003)
International Federated Conferences (OTM'03), Workshop on Metadata for Security
-
-
Cuppens, F.1
Miège, A.2
|