-
2
-
-
84944030615
-
Pseudonymizing unix log files
-
George Davida, Yair Frankel, and Owen Rees, editors, number 2437 in Lecture Notes in Computer Science, Bristol, United Kingdom, October . Springer
-
Ulrich Flegel. Pseudonymizing Unix log files. In George Davida, Yair Frankel, and Owen Rees, editors, Proceedings of the Infrastructure Security Conference (InfraSec2002), number 2437 in Lecture Notes in Computer Science, pages 162-179, Bristol, United Kingdom, October 2002. Springer.
-
(2002)
Proceedings of the Infrastructure Security Conference (InfraSec2002)
, pp. 162-179
-
-
Flegel, U.1
-
3
-
-
0034449375
-
Threshold-based identity recovery for privacy enhanced applications
-
Sushil Jajodia and Pierangela Samarati, editors, Athens, Greece, November . ACM SIGSAC, ACM Press
-
Joachim Biskup and Ulrich Flegel. Threshold-based identity recovery for privacy enhanced applications. In Sushil Jajodia and Pierangela Samarati, editors, Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 71 -79, Athens, Greece, November 2000. ACM SIGSAC, ACM Press.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 71-79
-
-
Biskup, J.1
Flegel, U.2
-
4
-
-
0018545449
-
How to share a secret
-
Adi Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
8
-
-
0033293621
-
A large scale distributed intrusion detection framework based on attack strategy analysis
-
Ming-Yuh Huang, Robert J. Jasper, and Thomas M. Wicks. A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks, 31(23-24):2465-2475, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2465-2475
-
-
Huang, M.-Y.1
Jasper, R.J.2
Wicks, T.M.3
-
9
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Tim Bass. Intrusion detection systems and multisensor data fusion. Communications of the ACM, 43(4):99-105, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
12
-
-
84922794799
-
Managing alerts in a multi-intrusion detection environment
-
New Orleans, Louisiana, USA, December . IEEE Computer Society Press
-
Frédéric Cuppens. Managing alerts in a multi-intrusion detection environment. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), pages 22-31, New Orleans, Louisiana, USA, December 2001. IEEE Computer Society Press.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001)
, pp. 22-31
-
-
Cuppens, F.1
-
13
-
-
84958955499
-
A mission-impact-based approach to INFOSEC alarm correlation
-
Andreas Wespi, Giovanni Vigna, and Luca Deri, editors, number 2516 in Lecture Notes in Computer Science, Zurich, Switzerland, October . Springer
-
Philip A. Porras, Martin W. Fong, and Alfonso Valdes. A mission-impact-based approach to INFOSEC alarm correlation. In Andreas Wespi, Giovanni Vigna, and Luca Deri, editors, Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002), number 2516 in Lecture Notes in Computer Science, pages 95-114, Zurich, Switzerland, October 2002. Springer.
-
(2002)
Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 95-114
-
-
Porras, P.A.1
Fong, M.W.2
Valdes, A.3
-
14
-
-
21644452488
-
Alert correlation through triggering events and common resources
-
Tucson, Arizona, USA, December . IEEE Computer Society Press
-
Dingbang Xu and Peng Ning. Alert correlation through triggering events and common resources. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), pages 360-369, Tucson, Arizona, USA, December 2004. IEEE Computer Society Press.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004)
, pp. 360-369
-
-
Xu, D.1
Ning, P.2
-
15
-
-
84962295060
-
Enlisting event patterns for cyber battlefield awareness
-
Hilton Head, South Carolina, January . DARPA and the IEEE Computer Society, IEEE Press
-
Louis Perrochon, Eunhei Jang, and David C. Luckham. Enlisting event patterns for cyber battlefield awareness. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000), pages 1411-1422, Hilton Head, South Carolina, January 2000. DARPA and the IEEE Computer Society, IEEE Press.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000)
, pp. 1411-1422
-
-
Perrochon, L.1
Jang, E.2
Luckham, D.C.3
-
16
-
-
35048884551
-
IDS interoperability and correlation using IDMEF and commodity systems
-
number 2513 in Lecture Notes in Computer Science, Singapore, December
-
Nathan Carey, Andrew Clark, and George Mohay. IDS interoperability and correlation using IDMEF and commodity systems. In Proceedings of the Fourth International Conference on Information and Communications Security (JCICS 2002), number 2513 in Lecture Notes in Computer Science, pages 252-264, Singapore, December 2002.
-
(2002)
Proceedings of the Fourth International Conference on Information and Communications Security (JCICS 2002)
, pp. 252-264
-
-
Carey, N.1
Clark, A.2
Mohay, G.3
-
17
-
-
33646160004
-
Correlation of intrusion symptoms: An application of chronicles
-
Giovanni Vigna, Erland Jonsson, and Christopher Krgel, editors, number 2820 in Lecture Notes in Computer Science, Pittsburgh, Pennsylvania, USA, September . Springer
-
Benjamin Morin and Hervé Debar. Correlation of intrusion symptoms: An application of chronicles. In Giovanni Vigna, Erland Jonsson, and Christopher Krgel, editors, Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003), number 2820 in Lecture Notes in Computer Science, pages 94-112, Pittsburgh, Pennsylvania, USA, September 2003. Springer.
-
(2003)
Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003)
, pp. 94-112
-
-
Morin, B.1
Debar, H.2
-
19
-
-
0034593179
-
A requires/provides model for computer attacks
-
Cork, Ireland, September . ACM, ACM Press
-
Steven J. Templeton and Karl Levitt. A requires/provides model for computer attacks. In Proceedings of the New Security Paradigms Workshop, pages 31-38, Cork, Ireland, September 2000. ACM, ACM Press.
-
(2000)
Proceedings of the New Security Paradigms Workshop
, pp. 31-38
-
-
Templeton, S.J.1
Levitt, K.2
-
20
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
Berkeley, California, USA, May . IEEE, IEEE Press
-
Frédéric Cuppens and Alexandre Miège. Alert correlation in a cooperative intrusion detection framework. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 202-215, Berkeley, California, USA, May 2002. IEEE, IEEE Press.
-
(2002)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 202-215
-
-
Cuppens, F.1
Miège, A.2
-
21
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
May
-
Peng Ning, Yun Cui, Douglas S. Reeves, and Dingbang Xu. Techniques and tools for analyzing intrusion alerts. ACM Transactions on Information and System Security, 7(2):274-318, May 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
22
-
-
10444243686
-
Learning attack strategies from intrusion alerts
-
Sushil Jajodia, Vijay Atluri, and Trent Jaeger, editors, Washington, D.C., USA, October . ACM SIGSAC, ACM Press
-
Peng Ning and Dingbang Xu. Learning attack strategies from intrusion alerts. In Sushil Jajodia, Vijay Atluri, and Trent Jaeger, editors, Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 200-209, Washington, D.C., USA, October 2003. ACM SIGSAC, ACM Press.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 200-209
-
-
Ning, P.1
Xu, D.2
-
25
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Joachim Biskup and Piero A. Bonatti. Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security, 3(1):14-27, 2004.
-
(2004)
International Journal of Information Security
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
26
-
-
84904883732
-
Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
Jun Xu, Jinliang Fan, Mostafa Ammar, and Sue B. Moon. Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP), pages 280-289, 2002.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP)
, pp. 280-289
-
-
Xu, J.1
Fan, J.2
Ammar, M.3
Moon, S.B.4
-
27
-
-
33746650302
-
CANINE: A combined converter and anonymizer tool for processing netflows for security
-
Dallas, Texas, USA, November
-
Yifan Li, Adam Slagell, Katherine Luo, and William Yurcik. CANINE: A combined converter and anonymizer tool for processing netflows for security. In Proceedings of the international Conference on Telecommunication Systems - Modeling and Analysis (ICTSM 2005), Dallas, Texas, USA, November 2005.
-
(2005)
Proceedings of the International Conference on Telecommunication Systems - Modeling and Analysis (ICTSM 2005)
-
-
Li, Y.1
Slagell, A.2
Luo, K.3
Yurcik, W.4
-
28
-
-
85084159849
-
Privacy-preserving sharing and correlation of security alerts
-
San Diego, California, USA, August
-
Patrick Lincoln, Phillip Porras, and Vitaly Shmatikov. Privacy-preserving sharing and correlation of security alerts. In Proceedings of the 13th USENIX Security Symposium, pages 239-254, San Diego, California, USA, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 239-254
-
-
Lincoln, P.1
Porras, P.2
Shmatikov, V.3
-
29
-
-
33746644985
-
Privacy-preserving alert correlation: A concept hierarchy based approach
-
Tucson, Arizona, USA, December . IEEE Computer Society Press
-
Dingbang Xu and Peng Ning. Privacy-preserving alert correlation: A concept hierarchy based approach. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), pages 537-546, Tucson, Arizona, USA, December 2005. IEEE Computer Society Press.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005)
, pp. 537-546
-
-
Xu, D.1
Ning, P.2
-
31
-
-
1242310066
-
A high-level programming environment for packet trace anonymization and transformation
-
Karlsruhe, Germany, August . ACM, ACM Press
-
Ruoming Pang and Vern Paxson. A high-level programming environment for packet trace anonymization and transformation. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2003), pages 339-351, Karlsruhe, Germany, August 2003. ACM, ACM Press.
-
(2003)
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2003)
, pp. 339-351
-
-
Pang, R.1
Paxson, V.2
-
32
-
-
33746599665
-
-
Wenke Lee, Ludovic Me and Andreas Wespi, editors. number 2212 in Lecture Notes in Computer Science, Davis, California, October . Springer
-
Wenke Lee, Ludovic Me and Andreas Wespi, editors. Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection (RAID 2001), number 2212 in Lecture Notes in Computer Science, Davis, California, October 2001. Springer.
-
(2001)
Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection (RAID 2001)
-
-
|