-
2
-
-
0020815483
-
Inductive Inference: Theory and Methods
-
D. Angluin and C. Smith. Inductive Inference: Theory and Methods. ACM Computing Surveys, 15(3), 1983.
-
(1983)
ACM Computing Surveys
, vol.15
, Issue.3
-
-
Angluin, D.1
Smith, C.2
-
6
-
-
85084160792
-
Understanding Data Lifetime via Whole System Simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. In USENIX Security Symposium, 2004.
-
(2004)
USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
7
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of Internet worms. In Proceedings of the ACM Symposium on Operating Systems Principles, 2005.
-
(2005)
Proceedings of the ACM Symposium on Operating Systems Principles
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
49949150022
-
Language Identification in the Limit
-
E. Gold. Language Identification in the Limit. Information and Control, 5(1967), 10.
-
(1967)
Information and Control
, vol.5
, pp. 10
-
-
Gold, E.1
-
11
-
-
0005720655
-
Defeating Sniffers and Intrusion Detection Systems
-
December
-
horizon. Defeating Sniffers and Intrusion Detection Systems. Phrack Magazine, 8(54), December 1998.
-
(1998)
Phrack Magazine
, vol.8
, Issue.54
-
-
horizon1
-
12
-
-
48649099376
-
-
IBM Zurich Research Laboratory
-
IBM Zurich Research Laboratory. Thor. http://www.zurich.ibm.com/csc/ infosec/gsal/past-projects/thor/, 2004.
-
(2004)
Thor
-
-
-
14
-
-
33751040190
-
Reverse Engineering of Network Signatures
-
Gold Coast, Australia, May
-
C. Kruegel, D. Mutz, W. Robertson, G. Vigna, and R. Kemmerer. Reverse Engineering of Network Signatures. In Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Gold Coast, Australia, May 2005.
-
(2005)
Proceedings of the AusCERT Asia Pacific Information Technology Security Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Vigna, G.4
Kemmerer, R.5
-
17
-
-
48649087131
-
-
Metasploit Project
-
Metasploit Project. Metasploit. http://www.metasploit.com/, 2005.
-
(2005)
Metasploit
-
-
-
18
-
-
84903593793
-
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems
-
Las Vegas, Nevada, December
-
D. Mutz, G. Vigna, and R. Kemmerer. An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. In Proceedings of the 2003 Annual Computer Security Applications Conference (ACSAC '03), pages 374-383, Las Vegas, Nevada, December 2003.
-
(2003)
Proceedings of the 2003 Annual Computer Security Applications Conference (ACSAC '03)
, pp. 374-383
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.3
-
20
-
-
0004145058
-
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection
-
Technical report, Secure Networks, January 1998
-
T. Ptacek and T. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, January 1998.
-
-
-
Ptacek, T.1
Newsham, T.2
-
21
-
-
48649099236
-
-
R. Graham. SideStep. http://www.robertgraham.com/tmp/sidestep.html, 2005.
-
(2005)
SideStep
-
-
Graham, R.1
-
23
-
-
27544472436
-
Language-Based Generation and Evaluation of NIDS Signatures
-
Oakland, California, May
-
S. Rubin, S. Jha, and B. Miller. Language-Based Generation and Evaluation of NIDS Signatures. IEEE Symposium on Security and Privacy, Oakland, California, May, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Rubin, S.1
Jha, S.2
Miller, B.3
-
28
-
-
48649088889
-
-
H. Spencer. regex: Regular Expression Library. http://arglist.com/regex/, 2005.
-
H. Spencer. regex: Regular Expression Library. http://arglist.com/regex/, 2005.
-
-
-
-
29
-
-
14844322335
-
Testing Network-based Intrusion Detection Signatures Using Mutant Exploits
-
Washington, DC, October
-
G. Vigna, W. Robertson, and D. Balzarotti. Testing Network-based Intrusion Detection Signatures Using Mutant Exploits. In Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS), pages 21-30, Washington, DC, October 2004.
-
(2004)
Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS)
, pp. 21-30
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
|