-
4
-
-
34548109163
-
-
Technical Report CSE-2006-20, University of California at Davis
-
Matt Bishop and Sean Peisert. Your Security Policy is What. Technical Report CSE-2006-20, University of California at Davis, 2006.
-
(2006)
Your Security Policy is What
-
-
Bishop, M.1
Peisert, S.2
-
8
-
-
84960382252
-
Forensix: A Robust, High-Performance Reconstruction System
-
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Feng, and Jonathan Walpole. Forensix: A Robust, High-Performance Reconstruction System. In Proceedings of the 25th International Conference on Distributed Computing Systems Workshops, pages 155-162, 2005.
-
(2005)
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops
, pp. 155-162
-
-
Goel, A.1
Feng, W.2
Maier, D.3
Feng, W.4
Walpole, J.5
-
9
-
-
0345302827
-
-
PhD thesis, University of California, San Diego, Department of Electrical and Computer Engineering
-
Andrew H. Gross. Analyzing Computer Intrusions. PhD thesis, University of California, San Diego, Department of Electrical and Computer Engineering, 1997.
-
(1997)
Analyzing Computer Intrusions
-
-
Gross, A.H.1
-
14
-
-
33745615461
-
Principles-Driven Forensic Analysis
-
Lake Arrowhead, CA, October 20-23
-
Sean Peisert, Matt Bishop, Sidney Karin, and Keith Marzullo. Principles-Driven Forensic Analysis. In Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pages 85-93, Lake Arrowhead, CA, October 20-23, 2005.
-
(2005)
Proceedings of the 2005 New Security Paradigms Workshop (NSPW)
, pp. 85-93
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
16
-
-
0002670359
-
Attack Trees: Modeling Security Threats
-
December
-
Bruce Schneier. Attack Trees: Modeling Security Threats. Dr. Dobb's Journal, 24(12):21-29, December 1999.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
22
-
-
0034593179
-
Requires/Provides Model for Computer Attacks
-
A, Ballycotton, County Cork, Ireland
-
Steven J. Templeton and Karl Levitt. A Requires/Provides Model for Computer Attacks. In Proceedings of the 2000 New Security Paradigms Workshop (NSPW), pages 31-38, Ballycotton, County Cork, Ireland, 2000.
-
(2000)
Proceedings of the 2000 New Security Paradigms Workshop (NSPW)
, pp. 31-38
-
-
Templeton, S.J.1
Levitt, K.2
-
24
-
-
33847137650
-
Modelling Network Intrusion Detection Alerts for Correlation
-
Jingmin Zhou, Mark Heckman, Brennan Reynolds, Adam Carlson, and Matt Bishop. Modelling Network Intrusion Detection Alerts for Correlation. To Appear in A CM Transactions on Information and System Security (TISSEC), 2007.
-
(2007)
To Appear in A CM Transactions on Information and System Security (TISSEC)
-
-
Zhou, J.1
Heckman, M.2
Reynolds, B.3
Carlson, A.4
Bishop, M.5
|