-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparison study
-
N. Adam and J. Wortmann. Security-control methods for statistical databases: A comparison study. ACM Computing Surveys, 21 (4):515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.1
Wortmann, J.2
-
5
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
Recent Advances in Intrusion Detection
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85-103, 2001.
-
(2001)
LNCS
, vol.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
6
-
-
0022130080
-
A data distortion by probability distribution
-
September
-
C. Liew, U. Choi, and C. Liew. A data distortion by probability distribution. ACM Transactions on Database Systems, 10(3):395-411, September 1985.
-
(1985)
ACM Transactions on Database Systems
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.1
Choi, U.2
Liew, C.3
-
9
-
-
33846297858
-
-
B. Morin and H. Debar. Correlation of intrusion symptoms: an application of chronicles. In Proceedings of the 6th International Conference on Recent Advances in Intrusion Detection (RAID'03), September 2003.
-
B. Morin and H. Debar. Correlation of intrusion symptoms: an application of chronicles. In Proceedings of the 6th International Conference on Recent Advances in Intrusion Detection (RAID'03), September 2003.
-
-
-
-
10
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
B. Morin, L. Me, H. Debar, and M. Ducassé. M2D2: A formal data model for IDS alert correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 115-137, 2002.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 115-137
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducassé, M.4
-
11
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, D.C, November
-
P. Ning, Y. Cui, and D. S. Reeves. Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 245-254, Washington, D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
12
-
-
14544283296
-
Hypothesizing and reasoning about attacks missed by intrusion detection systems
-
November
-
P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591-627, November 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 591-627
-
-
Ning, P.1
Xu, D.2
-
14
-
-
0021389555
-
Practical data-swapping: The first steps
-
March
-
S. Reiss. Practical data-swapping: The first steps. ACM Transactions on Database Systems, 9(1):20-37, March 1984.
-
(1984)
ACM Transactions on Database Systems
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.1
-
15
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
-
(1998)
-
-
Samarati, P.1
Sweeney, L.2
-
16
-
-
84856043672
-
A mathematical theory of communication
-
July
-
C. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 21:319-423, 623-656, July 1948.
-
(1948)
The Bell System Technical Journal
, vol.21
-
-
Shannon, C.1
-
17
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2):105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
|