메뉴 건너뛰기




Volumn 278, Issue , 2008, Pages 301-315

Anomaly detection with diagnosis in diversified systems using information flow graphs

Author keywords

Anomaly detection; Anomaly diagnosis; COTS diversity; Design diversity; Graph similarity

Indexed keywords

FAULT TOLERANCE; FLOW GRAPHS; GRAPHIC METHODS; INTRUSION DETECTION;

EID: 48249102627     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09699-5_20     Document Type: Conference Paper
Times cited : (6)

References (10)
  • 2
    • 7044240786 scopus 로고    scopus 로고
    • Champin, P.A., Solnon, C.: Measuring the similarity of labeled graphs. In: In Proceedings of the 5th International Conference on Case-Based Reasoning (ICCBR 2003), pp. 80-95. Trondheim, Norway (2003)
    • Champin, P.A., Solnon, C.: Measuring the similarity of labeled graphs. In: In Proceedings of the 5th International Conference on Case-Based Reasoning (ICCBR 2003), pp. 80-95. Trondheim, Norway (2003)
  • 6
    • 84958977234 scopus 로고    scopus 로고
    • Learning unknown attacks - a start
    • A. Wespi, G. Vigna, L. Deri (eds, Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection RAID, Zurich, Switzerland
    • Just, J.E., Reynolds, J.C., Clough, L.A., Danforth, M., Levitt, K.N., Maglich, R., Rowe, J.: Learning unknown attacks - a start. In: A. Wespi, G. Vigna, L. Deri (eds.) Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Lecture Notes in Computer Science, vol. 2516, pp. 158-176. Zurich, Switzerland (2002)
    • (2002) Lecture Notes in Computer Science , vol.2516 , pp. 158-176
    • Just, J.E.1    Reynolds, J.C.2    Clough, L.A.3    Danforth, M.4    Levitt, K.N.5    Maglich, R.6    Rowe, J.7
  • 7
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore, MD , URL
    • Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conference, pp. 353-365. Baltimore, MD (1997). URL http://www2.csl.sri.com/emerald/emerald-niss97.html
    • (1997) Proc. of the 20th National Information Systems Security Conference , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 9
    • 84881247246 scopus 로고    scopus 로고
    • Intrusion-tolerant architectures: Concepts and design
    • Architecting Dependable Systems, Springer-Verlag
    • Veríssimo, P.E., Neves, N.F., Correia, M.P.: Intrusion-tolerant architectures: Concepts and design. In: Architecting Dependable Systems, Lecture Notes in Computer Science, vol. 2677. Springer-Verlag (2003)
    • (2003) Lecture Notes in Computer Science , vol.2677
    • Veríssimo, P.E.1    Neves, N.F.2    Correia, M.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.