-
4
-
-
33750376598
-
-
Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, pp. 165-184. Springer, Heidelberg (2006)
-
Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 165-184. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
26444452602
-
A pointillist approach for comparing honeypots
-
Julisch, K, Krügel, C, eds, DIMVA 2005, Springer, Heidelberg
-
Pouget, F., Holz, T.: A pointillist approach for comparing honeypots. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 51-68. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3548
, pp. 51-68
-
-
Pouget, F.1
Holz, T.2
-
6
-
-
38149010143
-
-
The HoneyNet Project, Online, Available
-
The HoneyNet Project. [Online]. Available: http://www.honeynet.org
-
-
-
-
7
-
-
0009016272
-
An evening with Berferd in which a cracker is lured, endured, and studied
-
USENIX
-
Cheswick, B.: An evening with Berferd in which a cracker is lured, endured, and studied. In: USENIX Conference Proceedings, pp. 163-174. USENIX (1992)
-
(1992)
USENIX Conference Proceedings
, pp. 163-174
-
-
Cheswick, B.1
-
8
-
-
0024011325
-
Stalking the wily hacker
-
Stoll, C.: Stalking the wily hacker. Communications of the ACM 31(5), 484-497 (1988)
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 484-497
-
-
Stoll, C.1
-
9
-
-
38149066486
-
Techniques for increasing survivability in NATO CIS
-
Germany
-
Jaatun, M.G., Hallingstad, G.: Techniques for increasing survivability in NATO CIS. In: proceedings of the 1st European Survivability Workshop, February 2002, Köln-Wahn, Germany (2002)
-
(2002)
proceedings of the 1st European Survivability Workshop, February 2002, Köln-Wahn
-
-
Jaatun, M.G.1
Hallingstad, G.2
-
11
-
-
38149003465
-
-
Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable network systems: An emerging discipline. Sofware Engineering Institute (SEI), Carnegie Mellon University, Tech. Rep. CMU/SEI-97-TR-013 (1997-1999)
-
Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable network systems: An emerging discipline. Sofware Engineering Institute (SEI), Carnegie Mellon University, Tech. Rep. CMU/SEI-97-TR-013 (1997-1999)
-
-
-
-
12
-
-
0742317706
-
F.: SITAR- a Scalable Intrusion-Tolerant Architecture for Distributed Services
-
West Point, NY, June, IEEE Computer Society Press, Los Alamitos
-
Wang, F., Gong, F., Sargor, C., Goseva-Popstojana, Trivedi, K., Jou, F.: SITAR- a Scalable Intrusion-Tolerant Architecture for Distributed Services. In: proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, June 2001, pp. 38-45. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy
, pp. 38-45
-
-
Wang, F.1
Gong, F.2
Sargor, C.3
Goseva-Popstojana, T.4
Jou, K.5
-
13
-
-
38149081913
-
-
Online, Available
-
Bait and Switch Honeypot.[Online]. Available: http://baitnswitch. sourceforge.net/
-
Bait and Switch Honeypot
-
-
-
15
-
-
33745673426
-
Detecting targeted attacks using shadow honeypots. ICS-FORTH, Crete, Greece
-
Tech. Rep. TR-348 January
-
Anagnostakis, K., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.: Detecting targeted attacks using shadow honeypots. ICS-FORTH, Crete, Greece, Tech. Rep. TR-348 (January 2005)
-
(2005)
-
-
Anagnostakis, K.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.6
-
16
-
-
38149002713
-
-
Broen, T.: Innbruddstolerante systemer: En eksperimentell utprøving og vurdering. Master's thesis, University of Oslo, Norway (May 2005)
-
Broen, T.: Innbruddstolerante systemer: En eksperimentell utprøving og vurdering. Master's thesis, University of Oslo, Norway (May 2005)
-
-
-
-
17
-
-
77953729650
-
-
1st edn. Addison-Wesley, Reading
-
Hoglund, G., Butler, J.: Rootkits, 1st edn. Addison-Wesley, Reading (2006)
-
(2006)
Rootkits
-
-
Hoglund, G.1
Butler, J.2
-
19
-
-
0003907293
-
-
Macmillian Technical Publishing
-
Bace, R.G.: Intrusion Detection. Macmillian Technical Publishing (2000)
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
21
-
-
0028446146
-
Optimal-design of large software-systems using n-version programming
-
Ashrafi, N., Berman, O., Cutler, M.: Optimal-design of large software-systems using n-version programming. IEEE Transactions on Reliability 43(2), 344-350 (1994)
-
(1994)
IEEE Transactions on Reliability
, vol.43
, Issue.2
, pp. 344-350
-
-
Ashrafi, N.1
Berman, O.2
Cutler, M.3
|