-
1
-
-
0003513832
-
-
Technical Report NBSIR 76-1042, National Bureau of Standards ICST, Gaithersburg, MD, USA, Apr.
-
R. P. Abbott. Security Analysis and Enhancement of Computer Operating Systems. Technical Report NBSIR 76-1042, National Bureau of Standards ICST, Gaithersburg, MD, USA, Apr. 1976.
-
(1976)
Security Analysis and Enhancement of Computer Operating Systems
-
-
Abbott, R.P.1
-
3
-
-
85164875567
-
-
Syngress, Rockland, MA, USA
-
J. Beale, H. Meer, R. Temmingh, C. van der Walt, and R. Deraison. Nessus Network Auditing. Syngress, Rockland, MA, USA, 2004.
-
(2004)
Nessus Network Auditing
-
-
Beale, J.1
Meer, H.2
Temmingh, R.3
Van Der Walt, C.4
Deraison, R.5
-
4
-
-
0030092390
-
Checking for race conditions in file accesses
-
M. Bishop and M. Dilger. Checking for Race Conditions in File Accesses. Computing Systems, 9(2): 131-152, 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
5
-
-
33750963207
-
-
Technical Report ISI/RR-75-31, University of Southern California Information Sciences Institute, Marina del Rey, CA, USA, June
-
J. Carlstedt, R. Bisbey, and G. Popek. Pattern-Directed Protection Evaluation. Technical Report ISI/RR-75-31, University of Southern California Information Sciences Institute, Marina del Rey, CA, USA, June 1975.
-
(1975)
Pattern-directed Protection Evaluation
-
-
Carlstedt, J.1
Bisbey, R.2
Popek, G.3
-
6
-
-
85017067350
-
Real-time protocol analysis for detecting link-state routing protocol attacks
-
Feb.
-
H.-Y. Chang, S. R Wu, and Y. F. Jou. Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks. ACM Transactions on Information and System Security, 4(1): 1-36, Feb. 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.1
, pp. 1-36
-
-
Chang, H.-Y.1
Wu, S.R.2
Jou, Y.F.3
-
7
-
-
33750945588
-
-
Technical Report TM-WD-7203/000/00, System Development Corp., Washington D.C., USA, Jan.
-
L. M. Galie and R. R. Linde. Security Analysis of the IBM VS2/R3 Operating System Scientific Computer. Technical Report TM-WD-7203/000/00, System Development Corp., Washington D.C., USA, Jan. 1976.
-
(1976)
Security Analysis of the IBM VS2/R3 Operating System Scientific Computer
-
-
Galie, L.M.1
Linde, R.R.2
-
8
-
-
33750957627
-
-
Technical Report TM-WD-6505/000/00, System Development Corp., Washington D.C., USA, June
-
L. M. Galie, R. R. Linde, and K. R. Wilson. Security Analysis of the Texas Instruments Advanced Scientific Computer. Technical Report TM-WD-6505/000/00, System Development Corp., Washington D.C., USA, June 1975.
-
(1975)
Security Analysis of the Texas Instruments Advanced Scientific Computer
-
-
Galie, L.M.1
Linde, R.R.2
Wilson, K.R.3
-
9
-
-
84948991207
-
Penetration testing: A duet
-
Las Vegas, NV, USA, Dec. IEEE Press
-
D. Geer and J. Harthorne. Penetration Testing: A Duet. In Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), pages 185-198, Las Vegas, NV, USA, Dec. 2002. IEEE Press.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002)
, pp. 185-198
-
-
Geer, D.1
Harthorne, J.2
-
10
-
-
33749946100
-
Experience with a penetration analysis method and tool
-
Baltimore, MD, USA, Oct.
-
S. Gupta and V. D. Gligor. Experience with a Penetration Analysis Method and Tool. In Proceedings of the 15th National Computer Security Conference, pages 165-183, Baltimore, MD, USA, Oct. 1992.
-
(1992)
Proceedings of the 15th National Computer Security Conference
, pp. 165-183
-
-
Gupta, S.1
Gligor, V.D.2
-
11
-
-
84974763338
-
Towards a theory of penetration-resistant systems and its applications
-
S. Gupta and V. D. Gligor. Towards a Theory of Penetration-Resistant Systems and Its Applications. Journal of Computer Security, 1(2): 133-158, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.2
, pp. 133-158
-
-
Gupta, S.1
Gligor, V.D.2
-
12
-
-
1542384514
-
-
Technical report, Iowa State University, Ames, IA, USA, June
-
G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, Y. Wang, and R. Lutz. Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-Based Intrusion Detection Systems. Technical report, Iowa State University, Ames, IA, USA, June 2002.
-
(2002)
Software Fault Tree and Colored Petri Net Based Specification, Design and Implementation of Agent-based Intrusion Detection Systems
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Wang, Y.6
Lutz, R.7
-
13
-
-
84867314045
-
-
Technical Report P-5298, RAND Corporation, Santa Monica, CA, USA, Sept.
-
D. Hollingsworth, S. Glaseman, and M. Hopwood. Security Test and Evaluation Tools: An Approach to Operating System Security Analysis. Technical Report P-5298, RAND Corporation, Santa Monica, CA, USA, Sept. 1974.
-
(1974)
Security Test and Evaluation Tools: An Approach to Operating System Security Analysis
-
-
Hollingsworth, D.1
Glaseman, S.2
Hopwood, M.3
-
14
-
-
0003871155
-
-
Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany
-
K. Jensen. Coloured Petri Nets: Basic Concepts (Volume 1). Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany, 1997.
-
(1997)
Coloured Petri Nets: Basic Concepts (Volume 1)
-
-
Jensen, K.1
-
15
-
-
0003871155
-
-
Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany
-
K. Jensen. Coloured Petri Nets: Practical Use (Volume 3). Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany, 1997.
-
(1997)
Coloured Petri Nets: Practical Use (Volume 3)
-
-
Jensen, K.1
-
16
-
-
0032153859
-
Compositional verification of concurrent systems using petri-net-based condensation rules
-
Sept.
-
E. Y. T. Juan, J. J. P. Tsai, and T. Murata. Compositional Verification of Concurrent Systems Using Petri-Net-Based Condensation Rules. ACM Transactions on Programming Languages and Systems, 20(5):917-979, Sept. 1998.
-
(1998)
ACM Transactions on Programming Languages and Systems
, vol.20
, Issue.5
, pp. 917-979
-
-
Juan, E.Y.T.1
Tsai, J.J.P.2
Murata, T.3
-
17
-
-
3042716872
-
-
Technical Report ESD-TR-74-193, Information Systems Technology Application Office, Deputy for Command and Management Systems, Electronic Systems Division (AFSC), L. G. Hanscom AFB, MA, USA, June
-
P. A. Karger and R. R. Schell. Multics Security Evaluation: Vulnerability Analysis. Technical Report ESD-TR-74-193, Vol. II, Information Systems Technology Application Office, Deputy for Command and Management Systems, Electronic Systems Division (AFSC), L. G. Hanscom AFB, MA, USA, June 1974.
-
(1974)
Multics Security Evaluation: Vulnerability Analysis
, vol.2
-
-
Karger, P.A.1
Schell, R.R.2
-
18
-
-
0002028280
-
A pattern-matching model for instrusion detection
-
Baltimore, MD, USA, Oct.
-
S. Kumar and E. H. Spafford. A Pattern-Matching Model for Instrusion Detection. In In Proceedings of the National Computer Security Conference, pages 11-21, Baltimore, MD, USA, Oct. 1994.
-
(1994)
Proceedings of the National Computer Security Conference
, pp. 11-21
-
-
Kumar, S.1
Spafford, E.H.2
-
19
-
-
0022102587
-
Fault tree analysis, methods, and applications
-
Aug.
-
W. Lee, D. Grosh, and F. Tillman. Fault tree analysis, methods, and applications. IEEE Transactions on Reliability, 34(3): 194-203, Aug. 1985.
-
(1985)
IEEE Transactions on Reliability
, vol.34
, Issue.3
, pp. 194-203
-
-
Lee, W.1
Grosh, D.2
Tillman, F.3
-
20
-
-
0016600186
-
Operating system penetration
-
Proceedings of the AFIPS National Computer Conference, Anaheim, CA, USA, May. AFIPS Press
-
R. R. Linde. Operating System Penetration. In Proceedings of the AFIPS National Computer Conference, volume 44 of AFIPS Conference Proceedings, pages 361-368, Anaheim, CA, USA, May 1975. AFIPS Press.
-
(1975)
AFIPS Conference Proceedings
, vol.44
, pp. 361-368
-
-
Linde, R.R.1
-
21
-
-
0003652825
-
-
John Wiley & Sons, New York, NY, USA
-
M. A. Marsan, G. Balbo, G. Conte, S. Donatelli, and G. Franceschinis. Modelling with Generalized Stochastic Petri Nets. John Wiley & Sons, New York, NY, USA, 1995.
-
(1995)
Modelling with Generalized Stochastic Petri Nets
-
-
Marsan, M.A.1
Balbo, G.2
Conte, G.3
Donatelli, S.4
Franceschinis, G.5
-
24
-
-
0004068620
-
-
PhD thesis, Technische Hochschule Darmstadt, Darmstadt, Germany. Published in Schriften des Instituts für Instrumentelle Mathematik 3, 1-128, University of Bonn, Germany
-
C. A. Petri. Kommunikation mit Automaten. PhD thesis, Technische Hochschule Darmstadt, Darmstadt, Germany, 1962. Published in Schriften des Instituts für Instrumentelle Mathematik 3, 1-128, University of Bonn, Germany.
-
(1962)
Kommunikation Mit Automaten
-
-
Petri, C.A.1
-
25
-
-
0004006996
-
-
Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany
-
W. Reisig. Petri Nets: An Introduction. Monographs in Theoretical Computer Science. Springer Verlag, Heidelberg, Germany, 1985.
-
(1985)
Petri Nets: An Introduction
-
-
Reisig, W.1
-
26
-
-
85020200328
-
Toward a secure system engineering methodolgy
-
Charlottesville, VA, USA, Sept.
-
C. Salter, O. S. Saydjari, B. Schneier, and J. Wallner. Toward a Secure System Engineering Methodolgy. In Proceedings of the 1998 Workshop on New Security Paradigms (NSPW 1998), pages 2-10, Charlottesville, VA, USA, Sept. 1998.
-
(1998)
Proceedings of the 1998 Workshop on New Security Paradigms (NSPW 1998)
, pp. 2-10
-
-
Salter, C.1
Saydjari, O.S.2
Schneier, B.3
Wallner, J.4
-
27
-
-
0002670359
-
Attack trees
-
Dec.
-
B. Schneier. Attack Trees. Dr. Dobb's, 24(12):21-29, Dec. 1999.
-
(1999)
Dr. Dobb's
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
28
-
-
0031190774
-
Stubborn sets for real-time petri nets
-
July
-
R. H. Sloan and U. Buy. Stubborn Sets for Real-Time Petri Nets. Formal Methods in System Design, 11(1):23-40, July 1997.
-
(1997)
Formal Methods in System Design
, vol.11
, Issue.1
, pp. 23-40
-
-
Sloan, R.H.1
Buy, U.2
-
30
-
-
14744271048
-
Application penetration testing
-
Jan./Feb.
-
H. H. Thompson. Application Penetration Testing. IEEE Security & Privacy, 3(1):66-69, Jan./Feb. 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 66-69
-
-
Thompson, H.H.1
-
31
-
-
84960924881
-
Interval timed coloured petri nets and their analysis
-
M. A. Marsan, editor, Proceedings of Application and Theory of Petri Nets 1993, 14th International Conference, Chicago, IL, USA, June. Springer-Verlag
-
W. M. P. van der Aalst. Interval Timed Coloured Petri Nets and their Analysis. In M. A. Marsan, editor, Proceedings of Application and Theory of Petri Nets 1993, 14th International Conference, volume 691 of Lecture Notes in Computer Science, pages 453-472, Chicago, IL, USA, June 1993. Springer-Verlag.
-
(1993)
Lecture Notes in Computer Science
, vol.691
, pp. 453-472
-
-
Van Der Aalst, W.M.P.1
-
32
-
-
0029410947
-
Analysis of railway stations by means of interval timed coloured petri nets
-
Nov.
-
W. M. P. van der Aalst. Analysis of Railway Stations by Means of Interval Timed Coloured Petri Nets. Real-Time Systems, 9(3):241-263, Nov. 1995.
-
(1995)
Real-time Systems
, vol.9
, Issue.3
, pp. 241-263
-
-
Van Der Aalst, W.M.P.1
-
33
-
-
33750949706
-
-
Technical Report Special Publication SP 800-42, U.S. National Institute of Standards and Technology, Gaithersburg, MD, USA, Oct.
-
J. Wack, M. Tracy, and M. Souppaya. Guideline on Network Security Testing. Technical Report Special Publication SP 800-42, U.S. National Institute of Standards and Technology, Gaithersburg, MD, USA, Oct. 2003.
-
(2003)
Guideline on Network Security Testing
-
-
Wack, J.1
Tracy, M.2
Souppaya, M.3
-
34
-
-
33750934506
-
-
Technical Report SP-3728, System Development Corp., Santa Monica, CA, USA, Oct.
-
C. Weissman. System Security Analysis/Certification Methodology and Results. Technical Report SP-3728, System Development Corp., Santa Monica, CA, USA, Oct. 1973.
-
(1973)
System Security Analysis/Certification Methodology and Results
-
-
Weissman, C.1
-
35
-
-
33750948520
-
-
Technical Report TM-8889/000/00, Paramax Systems Corp., Camarillo, CA, USA, Dec. Prepared under contract to the U.S. Naval Research Laboratory
-
C. Weissman. Security Penetration Testing Guideline, U.S. Navy Handbook on Security Certification. Technical Report TM-8889/000/00, Paramax Systems Corp., Camarillo, CA, USA, Dec. 1992. Prepared under contract to the U.S. Naval Research Laboratory.
-
(1992)
Security Penetration Testing Guideline, U.S. Navy Handbook on Security Certification
-
-
Weissman, C.1
|