-
3
-
-
11144286566
-
A model of conversation exchange dynamics for detection, The 47 th
-
th Midwest Symposium on Circuits and Systems, vol. 3, pp. 231 - 234, 2004.
-
(2004)
Midwest Symposium on Circuits and Systems
, vol.3
, pp. 231-234
-
-
Mylavarapu, S.1
Zachary, J.2
Ettlich, D.3
McEachen, J.4
Ford, D.5
-
4
-
-
33749520206
-
Multiple coordinated views for network attack graphs
-
S. Noel, M. Jacobs, P. Kalapa and S. Jajodia, "Multiple coordinated views for network attack graphs," Proceedings of the IEEE Workshop on Visualization for Computer Security, pp. 99 - 106, 2005.
-
(2005)
Proceedings of the IEEE Workshop on Visualization for Computer Security
, pp. 99-106
-
-
Noel, S.1
Jacobs, M.2
Kalapa, P.3
Jajodia, S.4
-
7
-
-
21644481812
-
Correlating intrusion events and building attack scenarios through attack graph distances
-
S. Noel, E. Robertson and S. Jojodia, "Correlating intrusion events and building attack scenarios through attack graph distances," Computer Security Applications Conference, pp. 350-359, 2004.
-
(2004)
Computer Security Applications Conference
, pp. 350-359
-
-
Noel, S.1
Robertson, E.2
Jojodia, S.3
-
11
-
-
8744295707
-
Feasibility of detecting TCP-SYN scanning at a backbone router
-
K. Shah, S. Bohacek and A. Broido, "Feasibility of detecting TCP-SYN scanning at a backbone router," Proceedings of the 2004 American Control Conference, vol. 2, pp. 988 -995, 2004.
-
(2004)
Proceedings of the 2004 American Control Conference
, vol.2
, pp. 988-995
-
-
Shah, K.1
Bohacek, S.2
Broido, A.3
-
12
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann and J. Wing, "Automated generation and analysis of attack graphs," Proceedings of the 2002 IEEE Symposium in Security and Privacy, pp. 272 - 284, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium in Security and Privacy
, pp. 272-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
13
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
F. Valeur, G. Vigna, C. Kruegel and R. Kemmerer, "A comprehensive approach to intrusion detection alert correlation," IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 3, pp. 146 - 169, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.4
-
14
-
-
28444441975
-
An analysis approach for multi-stage network attacks
-
Y-M. Wang, Z-L. Liu, X-Y. Cheng and K-J. Zhang, "An analysis approach for multi-stage network attacks," Proceedings of 2005 International Conference on Machine Learning and Cybernetics, vol. 7, pp. 3949 - 3954, 2005.
-
(2005)
Proceedings of 2005 International Conference on Machine Learning and Cybernetics
, vol.7
, pp. 3949-3954
-
-
Wang, Y.-M.1
Liu, Z.-L.2
Cheng, X.-Y.3
Zhang, K.-J.4
|