-
1
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
April
-
T. Bass, "Intrusion detection systems and multisensor data fusion," Communications of the ACM 43, April 2000.
-
(2000)
Communications of the ACM
, vol.43
-
-
Bass, T.1
-
2
-
-
43249083914
-
-
Forum of Incident Response and Security Teams (FIRST), A complete guide to the common vulnerability scoring system. http://www.first.org/ cvss/cvss-guide.html, 2007.
-
Forum of Incident Response and Security Teams (FIRST), "A complete guide to the common vulnerability scoring system." http://www.first.org/ cvss/cvss-guide.html, 2007.
-
-
-
-
3
-
-
0030676601
-
How to systematically classify computer security intrusions
-
Oakland, CA, USA
-
U. Lindqvist and E. Jonsson, "How to systematically classify computer security intrusions," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 154-163, (Oakland, CA, USA), 1997.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
4
-
-
0000565716
-
A summary of computer misuse techniques
-
Baltimore, Maryland, USA, Oct. 10-13
-
P. G. Neumann and D. B. Parker, "A summary of computer misuse techniques," in Proceedings of the 12th National Computer Security Conference, pp. 396-407, (Baltimore, Maryland, USA), Oct. 10-13 1989.
-
(1989)
Proceedings of the 12th National Computer Security Conference
, pp. 396-407
-
-
Neumann, P.G.1
Parker, D.B.2
-
6
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms," Computer Communication Review 34(2), pp. 39-53, 2004.
-
(2004)
Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
7
-
-
33747345465
-
Using vulnerability trees for decision making in threat assessment,
-
University of Glamorgan, School of Computing, Wales, UK, June
-
S. Vidalis and A. Jones, "Using vulnerability trees for decision making in threat assessment," tech. rep., University of Glamorgan, School of Computing, Wales, UK, June 2003.
-
(2003)
tech. rep
-
-
Vidalis, S.1
Jones, A.2
-
8
-
-
84988504967
-
A graph-based system for network-vulnerability analysis
-
New York, NY, USA
-
C. Phillips and L. P. Swiler, "A graph-based system for network-vulnerability analysis," in Proceedings of the 1998 workshop for new security paradigms, pp. 71 - 79, (New York, NY, USA), 1998.
-
(1998)
Proceedings of the 1998 workshop for new security paradigms
, pp. 71-79
-
-
Phillips, C.1
Swiler, L.P.2
-
9
-
-
84883310821
-
Context-based intrusion detection using snort, nessus and bugtraq databases
-
Fredericton, October
-
F. Massicotte, M. Couture, L. Briand, and Y. Labiche, "Context-based intrusion detection using snort, nessus and bugtraq databases," in Proceedings of the Third Annual Conference on Privacy, Security and Trust, (Fredericton), October 2005.
-
(2005)
Proceedings of the Third Annual Conference on Privacy, Security and Trust
-
-
Massicotte, F.1
Couture, M.2
Briand, L.3
Labiche, Y.4
-
11
-
-
43249089794
-
-
T. N. S. Inc., Nessus vulnerability scanner. http://www.nessus.org/, 2007.
-
T. N. S. Inc., "Nessus vulnerability scanner." http://www.nessus.org/, 2007.
-
-
-
-
12
-
-
43249111226
-
-
S. Focus, Bugtraq vulnerability database. http://www.securityfocus.org/bid, 2006.
-
S. Focus, "Bugtraq vulnerability database." http://www.securityfocus.org/bid, 2006.
-
-
-
-
13
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
July-Sep
-
F. Valeur, G. Vigna, C. Kruegel, and R. A. Kemmerer, "A comprehensive approach to intrusion detection alert correlation," IEEE Transactions on Dependable and Secure Computing 1, pp. 146 - 169, July-Sep 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
14
-
-
84958955499
-
A mission-impact-based approach to infosec alarm correlation
-
Recent Advances in Intrusion Detection. 5th International Symposium, RAID 2002. Proceedings, Vo, Zurich, Switzerland
-
P. Porras, M. Fong, and A. Valdes, "A mission-impact-based approach to infosec alarm correlation," in Recent Advances in Intrusion Detection. 5th International Symposium, RAID 2002. Proceedings (Lecture Notes in Computer Science Vo.2516), pp. 95 - 114, (Zurich, Switzerland), 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2516
, pp. 95-114
-
-
Porras, P.1
Fong, M.2
Valdes, A.3
-
15
-
-
43249121200
-
Virtual terrain: A common representation of a computer network
-
March
-
J. Holsopple, B. Argauer, and S. J. Yang, "Virtual terrain: a common representation of a computer network," in Proceedings of SPIE, Defense and Security Symposium, March 2008.
-
(2008)
Proceedings of SPIE, Defense and Security Symposium
-
-
Holsopple, J.1
Argauer, B.2
Yang, S.J.3
-
17
-
-
27544507414
-
Situational awareness of a coordinated cyber attack
-
March
-
M. Sudit, A. Stotz, and M. Holender, "Situational awareness of a coordinated cyber attack," in Proceedings of SPIE, Defense and Security Symposium, pp. 114-129, March 2005.
-
(2005)
Proceedings of SPIE, Defense and Security Symposium
, pp. 114-129
-
-
Sudit, M.1
Stotz, A.2
Holender, M.3
-
18
-
-
33747337535
-
Measuring situation awareness and resolving inherent high-level fusion obstacles
-
April
-
M. Sudit, A. Stotz, M. Holender, W. Tagliaferri, and K. Canarelli, "Measuring situation awareness and resolving inherent high-level fusion obstacles," in Proceedings of SPIE, Defense and Security Symposium, 6242, April 2006.
-
(2006)
Proceedings of SPIE, Defense and Security Symposium
, vol.6242
-
-
Sudit, M.1
Stotz, A.2
Holender, M.3
Tagliaferri, W.4
Canarelli, K.5
|