-
2
-
-
37149050856
-
Scenario-oriented modeling in AsmL and its instrumentation for testing
-
In: Portland, OR, USA
-
Barnett, M., Grieskamp, W., Gurevich, Y., Schulte, W., Tillmann, N., Veanes, M.: Scenario-oriented modeling in AsmL and its instrumentation for testing. In: Second International Workshop on Scenarios and State Machine Models, Algorithms, and Tools, Portland, OR, USA (2003)
-
(2003)
Second International Workshop on Scenarios and State Machine Models, Algorithms, and Tools
-
-
Barnett, M.1
Grieskamp, W.2
Gurevich, Y.3
Schulte, W.4
Tillmann, N.5
Veanes, M.6
-
3
-
-
33644932227
-
Model-based testing with AsmL.NET
-
Technical report, Microsoft Research, Redmond, WA, USA
-
Barnett, M., Grieskamp, W., Nachmanson, L., Schulte, W., Tillmann, N., Veanes, M.: Model-based testing with AsmL.NET. Technical report, Microsoft Research, Redmond, WA, USA (2003)
-
(2003)
-
-
Barnett, M.1
Grieskamp, W.2
Nachmanson, L.3
Schulte, W.4
Tillmann, N.5
Veanes, M.6
-
4
-
-
0002063138
-
Automatic generation of functional vectors using the extended finite state machine model
-
Cheng K.T. and Krishnakumar A.S. (1996). Automatic generation of functional vectors using the extended finite state machine model. ACM Trans. Design Autom. Elec. Syst. 1(1): 57-79
-
(1996)
ACM Trans. Design Autom. Elec. Syst.
, vol.1
, Issue.1
, pp. 57-79
-
-
Cheng, K.T.1
Krishnakumar, A.S.2
-
5
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
In: Scottsdale, AZ, USA
-
Dermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proceedings of 15th Annual Computer Security Applications Conference, Scottsdale, AZ, USA, pp. 55-64 (1999)
-
(1999)
Proceedings of 15th Annual Computer Security Applications Conference
, pp. 55-64
-
-
Dermott, J.1
Fox, C.2
-
6
-
-
18744400629
-
Translating snort rules to STATL scenarios
-
In: Davis, CA, USA. LNCS
-
Eckmann, S.T.: Translating snort rules to STATL scenarios. In: Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Davis, CA, USA. LNCS, vol. 2212, pp. 69-84 (2001)
-
(2001)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)
, vol.2212
, pp. 69-84
-
-
Eckmann, S.T.1
-
7
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
Eckmann S., Vigna G. and Kemmerer R. (2002). STATL: An attack language for state-based intrusion detection. J. Comput. Sec. 10: 71-104
-
(2002)
J. Comput. Sec.
, vol.10
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
8
-
-
33846312311
-
Efficient context-sensitive intrusion detection
-
In: San Diego, CA, USA
-
Giffin, J., Jha, S., Miller, B.: Efficient context-sensitive intrusion detection. In: 11th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA (2004)
-
(2004)
11th Annual Network and Distributed Systems Security Symposium (NDSS)
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
9
-
-
85133843181
-
Bridging the gap: Software specification meets intrusion detector
-
In: Markham, ON, Canada
-
Graves, M., Sulkernine, M.: Bridging the gap: software specification meets intrusion detector. In: Proceedings of the Fourth Annual Conference on Privacy, Security and Trust (PST), Markham, ON, Canada, pp. 265-274 (2006)
-
(2006)
Proceedings of the Fourth Annual Conference on Privacy, Security and Trust (PST)
, pp. 265-274
-
-
Graves, M.1
Zulkernine, M.2
-
10
-
-
36949017943
-
Testable use cases in the abstract state machine language
-
In: Hong Kong
-
Grieskamp, W., Lepper, M., Schulte, W., Tillmann, N.: Testable use cases in the abstract state machine language. In: Proceedings of Asia-Pacific Conference on Quality Software, Hong Kong, pp.167-172 (2001)
-
(2001)
Proceedings of Asia-Pacific Conference on Quality Software
, pp. 167-172
-
-
Grieskamp, W.1
Lepper, M.2
Schulte, W.3
Tillmann, N.4
-
11
-
-
34548183566
-
Towards a UML profile for model-based risk assessment
-
In: Dresden, Germany, LNCS
-
Houmb, S., den Braber, F., Lund, M.S., Stolen, K.: Towards a UML profile for model-based risk assessment. In: Proceedings of the UML 2002, Dresden, Germany, LNCS vol. 2460, pp. 79-92 (2002)
-
(2002)
Proceedings of the UML 2002
, vol.2460
, pp. 79-92
-
-
Houmb, S.1
den Braber, F.2
Lund, M.S.3
Stolen, K.4
-
12
-
-
34250005793
-
UMLintr: A UML profile for specifying intrusions
-
In: Tucson, AZ, USA
-
HusAein, M., Zulkernine, M.: UMLintr: a UML profile for specifying intrusions. In: Proceedings of the IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, Tucson, AZ, USA, pp. 279-288 (2006)
-
(2006)
Proceedings of the IEEE International Conference and Workshop on the Engineering of Computer-Based Systems
, pp. 279-288
-
-
Hussein, M.1
Zulkernine, M.2
-
13
-
-
33847617890
-
Intrusion detection aware component-based systems: A specification-based approach
-
Hussein M. and Zulkernine M. (2007). Intrusion detection aware component-based systems: A specification-based approach. J. Syst. Softw. 80(5): 700-710
-
(2007)
J. Syst. Softw.
, vol.80
, Issue.5
, pp. 700-710
-
-
Hussein, M.1
Zulkernine, M.2
-
14
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
In: Dresden, Germany. LNCS
-
JuEdie;rjens, J.: UMLsec: extending UML for secure systems development. In: Proceedings of the UML 2002, Dresden, Germany. LNCS vol. 2460, pp. 412-425 (2002)
-
(2002)
Proceedings of the UML 2002
, vol.2460
, pp. 412-425
-
-
Jüjens, J.1
-
15
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
In: Dresden, Germany. LNCS
-
LoddeAstedt, T., Basin, D.A., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: Proceedings of the UML 2002, Dresden, Germany. LNCS vol. 2460, pp. 426-441 (2002)
-
(2002)
Proceedings of the UML 2002
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
16
-
-
34548137832
-
Context-based intrusion detection using snort
-
In: St. Andrews, NB, Canada
-
Massicotte, F., Couture, M., Labiche, Y.: Context-based intrusion detection using snort. In: Proceedings of the Third Annual Conference on Privacy, Security and Trust, St. Andrews, NB, Canada, pp. 53-61 (2005)
-
(2005)
Proceedings of the Third Annual Conference on Privacy, Security and Trust
, pp. 53-61
-
-
Massicotte, F.1
Couture, M.2
Labiche, Y.3
-
18
-
-
34548135331
-
-
MIT Lincoln Laboratory (Online). Available: Last accessed in January
-
MIT Lincoln Laboratory, DARPA Intrusion Detection Data Sets (Online). Available: http://www.ll.mit.edu/IST/ideval/data/data_index.html. Last accessed in January 2007
-
(2007)
DARPA Intrusion Detection Data Sets
-
-
-
19
-
-
34548138040
-
Object Management Group: UML profile for modeling quality of service and fault tolerance characteristics and mechanisms
-
Technical report
-
Object Management Group: UML profile for modeling quality of service and fault tolerance characteristics and mechanisms. Technical report (2004)
-
(2004)
-
-
-
20
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson V. (1999). Bro: A system for detecting network intruders in real-time. Comput. Netw. 31(23-24): 2435-2463
-
(1999)
Comput. Netw.
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
21
-
-
34548143531
-
Evaluating the viability of intrusion detection system benchmarking
-
Bachelor's Thesis, University of Virginia, VA, USA
-
Pickering, K.J.: Evaluating the viability of intrusion detection system benchmarking. Bachelor's Thesis, University of Virginia, VA, USA (2002)
-
(2002)
-
-
Pickering, K.J.1
-
22
-
-
33847631104
-
Detecting intrusions specified in a software specification language
-
In: (COMPSAC), Chicago, IL, USA
-
Raihan, M., Zulkernine, M.: Detecting intrusions specified in a software specification language. In: Proceedings of International Computer Software and Applications Conference (COMPSAC), Chicago, IL, USA, pp. 143-148 (2005)
-
(2005)
Proceedings of International Computer Software and Applications Conference
, pp. 143-148
-
-
Raihan, M.1
Zulkernine, M.2
-
23
-
-
34548132900
-
AsmLSec: An extension of abstract state machine language for attack scenario specification
-
In: Vienna, Austria
-
RaiAan, M., Zulkernine, M.: AsmLSec: an extension of abstract state machine language for attack scenario specification. In: Proceedings of the Second International Conference on Availability, Reliability and Security, Vienna, Austria, pp. 775-782 (2007)
-
(2007)
Proceedings of the Second International Conference on Availability, Reliability and Security
, pp. 775-782
-
-
Raihan, M.1
Zulkernine, M.2
-
24
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
In: LISA '99, Seattle, WA, USA
-
Roesch, M.: Snort-Lightweight intrusion detection for networks. In: Proceedings of the USENIX 13th System Administrations Conference, LISA '99, Seattle, WA, USA, pp. 229.238 (1999)
-
(1999)
Proceedings of the USENIX 13th System Administrations Conference
, pp. 229-238
-
-
Roesch, M.1
-
25
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
In: (TOOLS-37 '00), Sydney, NSW, Australia
-
Sindre, G., Opdahl, A.L.: Eliciting security requirements by misuse cases. In: Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS-37 '00), Sydney, NSW, Australia, pp. 120-131 (2001)
-
(2001)
Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
26
-
-
2342479360
-
-
(Online). Available: Last accessed in January
-
Snort Users Manual (Online). Available: http://snort.org/. Last accessed in January 2007
-
(2007)
Snort Users Manual
-
-
-
27
-
-
33750267521
-
-
Last Accessed in January 2007
-
The Abstract State Machine Language. http://research.microsoft.com/fse/ asml/. Last Accessed in January 2007
-
The Abstract State Machine Language
-
-
-
28
-
-
34548132905
-
-
Website: Last accessed in January
-
The Object Management Group. Website: http://www.omg.org. Last accessed in January 2007
-
(2007)
The Object Management Group
-
-
-
29
-
-
0003683075
-
-
Website: Last accessed in January
-
TheHUnified Modeling Language: Website: http://www.uml.org. Last accessed in January 2007
-
(2007)
The Unified Modeling Language
-
-
-
30
-
-
84947547225
-
Experiences with specification-based intrusion detection
-
In: (RAID) Davis, CA, USA. LNCS
-
Uppuluri, P., Sekar, R.: Experiences with specification-based intrusion detection. In: Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Davis, CA, USA. LNCS, vol. 2212, pp. 172-189 (2001)
-
(2001)
Proceedings of the International Symposium on Recent Advances in Intrusion Detection
, vol.2212
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
31
-
-
33645588003
-
ASL: A specification language for intrusion detection and network monitoring
-
Master's thesis, Iowa State University, IA, USA
-
AVankamamidi, R.: ASL: a specification language for intrusion detection and network monitoring. Master's thesis, Iowa State University, IA, USA (1998)
-
(1998)
-
-
Vankamamidi, R.1
-
32
-
-
0006890005
-
The development and analysis of intrusion detection algorithms
-
Master's thesis, Massachusetts Institute of Technology, MA, USA
-
Webster, S.: The development and analysis of intrusion detection algorithms. Master's thesis, Massachusetts Institute of Technology, MA, USA (1998)
-
(1998)
-
-
Webster, S.1
-
33
-
-
52249097319
-
-
National Research Council Canada NR C/ERB-1134, NRC 48478
-
Yee, G.: Recent research in secure software. National Research Council Canada NR C/ERB-1134, NRC 48478 (2006)
-
(2006)
Recent Research in Secure Software
-
-
Yee, G.1
|