-
2
-
-
84962259930
-
Building survivable systems: An integrated approach based on intrusion detection and damage containment
-
T. Bowen, D. Chee, M. Segal, R. Sekar, T. Shanbhag, and P. Uppuluri. Building survivable systems: An integrated approach based on intrusion detection and damage containment. In Proceedings of the IEEE DARPA Information Survivability Conference and Exposition, 2000.
-
(2000)
Proceedings of the IEEE DARPA Information Survivability Conference and Exposition
-
-
Bowen, T.1
Chee, D.2
Segal, M.3
Sekar, R.4
Shanbhag, T.5
Uppuluri, P.6
-
3
-
-
0345477912
-
A methodology for using intelligent agents to provide automated intrusion response
-
C. Carver, J. M. Hill, and J. R. Surdu. A methodology for using intelligent agents to provide automated intrusion response. In Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, pages 110-116, 2000.
-
(2000)
Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop
, pp. 110-116
-
-
Carver, C.1
Hill, J.M.2
Surdu, J.R.3
-
4
-
-
32044460933
-
-
The Camelot Press Ltd, London, GB
-
R. G. Coyle. Decision Analysis. The Camelot Press Ltd., London, GB, 1972.
-
(1972)
Decision Analysis
-
-
Coyle, R.G.1
-
5
-
-
27544503196
-
ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment
-
B. Foo, Y.-S. Wu, Y.-C. Mao, S. Bagchi, and E. H. Spafford. ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment. In Proceedings of the International Conference on Dependable Systems and Networks, pages 508-517, 2005.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 508-517
-
-
Foo, B.1
Wu, Y.-S.2
Mao, Y.-C.3
Bagchi, S.4
Spafford, E.H.5
-
6
-
-
18844394534
-
Towards an approach for automatically repairing compromised network systems
-
August
-
J. B. Grizzard, S. Krasser, H. L. Owen, E. R. Dodson, and G. J. Conti. Towards an approach for automatically repairing compromised network systems. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications, pages 389-392, August 2004.
-
(2004)
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications
, pp. 389-392
-
-
Grizzard, J.B.1
Krasser, S.2
Owen, H.L.3
Dodson, E.R.4
Conti, G.J.5
-
8
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Millerand, S. Stolfo, and E. Zadok. Toward cost-sensitive modeling for intrusion detection and response. In Journal of Computer Security, volume 10, pages 5-22, 2000.
-
(2000)
Journal of Computer Security
, vol.10
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Millerand, M.3
Stolfo, S.4
Zadok, E.5
-
9
-
-
33745652318
-
FLIPS: Hybrid adaptive intrustion prevention
-
M. E. Locasto, K. Wang, A. D. Keromytis, and S. J. Stolfo. FLIPS: Hybrid adaptive intrustion prevention. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection, pages 82-101, 2005.
-
(2005)
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection
, pp. 82-101
-
-
Locasto, M.E.1
Wang, K.2
Keromytis, A.D.3
Stolfo, S.J.4
-
10
-
-
84938830983
-
-
MIT, Available from
-
MIT. Intrusion detection attacks database. Available from "http://www.ll.mit.edu/IST/ideval/docs/1999/attackDB.html".
-
Intrusion detection attacks database
-
-
-
13
-
-
84885578759
-
Rx: Treating bugs as allergies - a safe method to survive software failures
-
F. Qin, J. Tucek, J. Sundaresan, and Y Zhou. Rx: treating bugs as allergies - a safe method to survive software failures. In Proceedings of the 20th ACM symposium on Operating systems principles, pages 235-248, 2005.
-
(2005)
Proceedings of the 20th ACM symposium on Operating systems principles
, pp. 235-248
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
15
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proceedings 8th Usenix Security Symposium, 1999.
-
(1999)
Proceedings 8th Usenix Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
18
-
-
36949041027
-
Automated caching of behavioral patterns for efficient run-time monitoring
-
N. Stakhanova, S. Basu, R. Lutz, and J. Wong. Automated caching of behavioral patterns for efficient run-time monitoring. In Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006.
-
(2006)
Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
-
-
Stakhanova, N.1
Basu, S.2
Lutz, R.3
Wong, J.4
-
19
-
-
34548776459
-
A taxonomy of intrusion response systems
-
N. Stakhanova, S. Basu, and J. Wong. A taxonomy of intrusion response systems. International Journal of Information and Computer Security, 1(1/2): 169-184, 2007.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 169-184
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
22
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
G. White, E. Fisch, and U. Pooch. Cooperating security managers: A peer-based intrusion detection system. In IEEE Network, volume 10, pages 20-23, 1996.
-
(1996)
IEEE Network
, vol.10
, pp. 20-23
-
-
White, G.1
Fisch, E.2
Pooch, U.3
|