-
1
-
-
0004309520
-
Research in Intrusion-Detection Systems: A Survey
-
Technical report 98-17, Chalmers University of Technology
-
S. Axelsson, "Research in Intrusion-Detection Systems: A Survey", Technical report 98-17, Chalmers University of Technology, 1998.
-
(1998)
-
-
Axelsson, S.1
-
2
-
-
0242572726
-
Measuring System Normality
-
May
-
M. Burgers, H. Haugerud, S. Straumsnes, and T. Reitan, "Measuring System Normality", ACM Transactions on Computer Systems, Vol. 20, No. 2, May 2002, pp. 125-160.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.2
, pp. 125-160
-
-
Burgers, M.1
Haugerud, H.2
Straumsnes, S.3
Reitan, T.4
-
3
-
-
44949259605
-
OWL-S Semantics of Security Web Services: A Case Study
-
Menlo Park, California, USA
-
G. Denker, S. Nguyen, and A. Ton, "OWL-S Semantics of Security Web Services: a Case Study", SRI International, Menlo Park, California, USA., 2004.
-
(2004)
SRI International
-
-
Denker, G.1
Nguyen, S.2
Ton, A.3
-
5
-
-
84863643277
-
SOAP Web Services Attacks: Are your web applications vulnerable?
-
S. Faust, "SOAP Web Services Attacks: Are your web applications vulnerable?", SPIDynamics, 2003.
-
(2003)
SPIDynamics
-
-
Faust, S.1
-
6
-
-
44949257742
-
Indra: A peer-to-peer approach to network intrusion detection and prevention
-
Austria, June
-
R. Janakiraman, M. Waldvogel, and Q. Zhang, "Indra: A peer-to-peer approach to network intrusion detection and prevention", IEEE WETICE2003, Austria, June 2003.
-
(2003)
IEEE WETICE2003
-
-
Janakiraman, R.1
Waldvogel, M.2
Zhang, Q.3
-
7
-
-
44949160343
-
Security in a Web Services World: A Proposed Architecture and Roadmap
-
IBM and Microsoft, April
-
IBM and Microsoft, "Security in a Web Services World: A Proposed Architecture and Roadmap", A joint security whitepaper from IBM and Microsoft, April 2002.
-
(2002)
A joint security whitepaper from IBM and Microsoft
-
-
-
8
-
-
44949194395
-
-
KAoS. http://www.ihmc.us/research/projects/KAoS/.
-
KAoS
-
-
-
9
-
-
8344261545
-
PacketScore: Statistical-based Overload Control against Distributed Denial-of-Service Attacks
-
March
-
Y. Kim, W. C. Lau, M. C. Chuah, and J. H. Chao, "PacketScore: Statistical-based Overload Control against Distributed Denial-of-Service Attacks", IEEE INFOCOM, March 2004.
-
(2004)
IEEE INFOCOM
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, J.H.4
-
10
-
-
44949173600
-
A Security Characterisation Framework for Trustworthy Component Based Software Systems
-
USA
-
K. Khan and J. Han, "A Security Characterisation Framework for Trustworthy Component Based Software Systems", COMPSAC2003, USA, 2003.
-
(2003)
COMPSAC2003
-
-
Khan, K.1
Han, J.2
-
11
-
-
44949151258
-
Security Characterisation and Compositional Analysis for Component-based Software Systems
-
PhD thesis, Monash University, April
-
K. Khan, "Security Characterisation and Compositional Analysis for Component-based Software Systems", PhD thesis, Monash University, April 2005.
-
(2005)
-
-
Khan, K.1
-
12
-
-
62749155242
-
Security Ontology for Annotating Resources
-
Cyprus
-
A. Kim, J. Luo, and M. Kang, "Security Ontology for Annotating Resources", ODBASE 2005, Cyprus, 2005
-
(2005)
ODBASE 2005
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
13
-
-
33845548325
-
Attacking and Defending Web Services
-
January
-
P. Lindstrom, "Attacking and Defending Web Services", A Spire Research Report, January 2004.
-
(2004)
A Spire Research Report
-
-
Lindstrom, P.1
-
14
-
-
44949142636
-
-
METEOR-S
-
METEOR-S, http://lsdis.cs.uga.edu/projects/meteor-s/.
-
-
-
-
15
-
-
25844488402
-
D-WARD: Source-End Defence Against Distributed Denial-of-Service Attacks
-
University of California
-
J. Mirkovic, "D-WARD: Source-End Defence Against Distributed Denial-of-Service Attacks", The PhD thesis, University of California, 2003.
-
(2003)
The PhD thesis
-
-
Mirkovic, J.1
-
17
-
-
33645830920
-
What Is Web 2.0, Design Patterns and Business Models for the Next Generation of Software
-
T. O'Reilly, "What Is Web 2.0, Design Patterns and Business Models for the Next Generation of Software", 2005.
-
(2005)
-
-
O'Reilly, T.1
-
18
-
-
44949121280
-
-
OWL
-
OWL, http:w3.org/TR/owl-features/.
-
-
-
-
19
-
-
44949107802
-
-
OWL-S
-
OWL-S, http://www.daml.org/services/.
-
-
-
-
20
-
-
44949237611
-
Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
-
USA
-
A. Stamos and S. Stender, "Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps", BlackHat2005, USA, 2005.
-
(2005)
BlackHat2005
-
-
Stamos, A.1
Stender, S.2
-
21
-
-
44949190993
-
-
SWSL
-
SWSL, http://www.daml.org/services/swsl/.
-
-
-
-
22
-
-
33746416682
-
A target-centric ontology for intrusion detection
-
Mexico
-
J. Undercoffer, A. Joshi, T. Finin, and J. Pinkston, "A target-centric ontology for intrusion detection," Int. Joint Conference on Artificial Intelligence, Mexico, 2004.
-
(2004)
Int. Joint Conference on Artificial Intelligence
-
-
Undercoffer, J.1
Joshi, A.2
Finin, T.3
Pinkston, J.4
-
23
-
-
44949110433
-
Specifying Dynamic Security Properties of Web Service Based Systems, SKG2006, Guilin, China, 2006
-
To appear
-
A. Vorobiev and J. Han, "Specifying Dynamic Security Properties of Web Service Based Systems", SKG2006, Guilin, China, 2006. To appear.
-
-
-
Vorobiev, A.1
Han, J.2
-
24
-
-
44949156941
-
-
WSMO
-
WSMO, http://www.wsmo.org/.
-
-
-
|