-
3
-
-
85068453855
-
The Semantic Web Vision
-
The MIT Press, April 2004, Retrieved July 27, 2007
-
G. Antoniou, and F. V. Harmelen, "The Semantic Web Vision" in A Semantic Web Primer, The MIT Press, April 2004. http://mitpress.mit. edu/books/chapters/0262012103chap1.pdf Retrieved July 27, 2007.
-
A Semantic Web Primer
-
-
Antoniou, G.1
Harmelen, F.V.2
-
6
-
-
33845947480
-
Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection
-
West Point, NY
-
A. El-Semary, J. Edmonds, J. Gonzalez-Pino, and M. Papa, "Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection", Proceedings of the 2006 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY.
-
Proceedings of the 2006 IEEE Workshop on Information Assurance United States Military Academy
-
-
El-Semary, A.1
Edmonds, J.2
Gonzalez-Pino, J.3
Papa, M.4
-
7
-
-
84863643277
-
SOAP Web Services Attacks:Are your web applications vulnerable?
-
S. Faust,"SOAP Web Services Attacks:Are your web applications vulnerable?", SPI Dynamics, 2003.
-
(2003)
SPI Dynamics
-
-
Faust, S.1
-
8
-
-
15744401763
-
Introduction
-
The MIT Press, March, Retrieved July 27, 2007
-
D. Fensel, J. A. Hendler, H. Lieberman, and W. Wahlster, "Introduction" in Spinning the Semantic Web, The MIT Press, March 2005. http://mitpress.mit.edu/books/chapters/0262062321intro1.pdf Retrieved July 27, 2007.
-
(2005)
Spinning the Semantic Web
-
-
Fensel, D.1
Hendler, J.A.2
Lieberman, H.3
Wahlster, W.4
-
9
-
-
0036930259
-
Using Data Mining To Discover Signatures In Network-Based Intrusion Detection
-
Beijing, 4-5 November
-
H. Han, X. L. Lu, and L. Y. Ren, "Using Data Mining To Discover Signatures In Network-Based Intrusion Detection", Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing, 4-5 November, 2002.
-
(2002)
Proceedings of the First International Conference on Machine Learning and Cybernetics
-
-
Han, H.1
Lu, X.L.2
Ren, L.Y.3
-
10
-
-
0242637516
-
Adaptive Intrusion Detection with Data Mining
-
Man and Cybernatics, Pages
-
M. Hossain, S. M. Bridges, and R. B. Vaughn, Jr, "Adaptive Intrusion Detection with Data Mining", Proceedings of the IEEE International Conference on Systems, Man and Cybernatics, 2003. Page(s):3097 - 3103 vol.4.
-
(2003)
Proceedings of the IEEE International Conference on Systems
, vol.4
, pp. 3097-3103
-
-
Hossain, M.1
Bridges, S.M.2
Vaughn Jr, R.B.3
-
11
-
-
33845548325
-
Attacking and Defending Web Services
-
January
-
P. Lindstrom, "Attacking and Defending Web Services", A Spire Research Report, January 2004.
-
(2004)
A Spire Research Report
-
-
Lindstrom, P.1
-
12
-
-
38949087920
-
Design and Implementation of an XML Firewall
-
Guangzhou, China, Nov. 3-6
-
Y. S. Loh, W. C. Yau, C. T. Wong and W. C. Ho, "Design and Implementation of an XML Firewall", Proceedings of the 2006 International Conference on Computational Intelligence and Security (CIS2006), Guangzhou, China, Nov. 3-6, 2006, pp. 1147-1150.
-
(2006)
Proceedings of the 2006 International Conference on Computational Intelligence and Security (CIS2006)
, pp. 1147-1150
-
-
Loh, Y.S.1
Yau, W.C.2
Wong, C.T.3
Ho, W.C.4
-
14
-
-
0035747057
-
-
J. Luo, S. M. Bridges, and R. B. Vaughn, Jr., Fuizzy Frequent Episodes for Real-Time Intrusion Detection, Preceedings of 2001 IEEE International Fuzzy Systems Conference.
-
J. Luo, S. M. Bridges, and R. B. Vaughn, Jr., "Fuizzy Frequent Episodes for Real-Time Intrusion Detection", Preceedings of 2001 IEEE International Fuzzy Systems Conference.
-
-
-
-
15
-
-
49049095849
-
-
O. Maor and A. Shulman, SQL Injection Signatures Evasion, Imperva, Inc. April 2004.
-
O. Maor and A. Shulman, "SQL Injection Signatures Evasion", Imperva, Inc. April 2004.
-
-
-
-
16
-
-
49049098951
-
-
K. K. Mookhev and Nilesh Burghate, Detection of SQL Injection and Cross-site Scripting Attacks, Network Intelligence India Pvt. Ltd. 2004.
-
K. K. Mookhev and Nilesh Burghate, "Detection of SQL Injection and Cross-site Scripting Attacks", Network Intelligence India Pvt. Ltd. 2004.
-
-
-
-
19
-
-
33749606368
-
Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques
-
S. Petrovic, G. A. Ivarez, A. Orfila, and J. Carbo, "Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques", Proceedings of the 39th Hawaii International Conference on System Sciences, 2006.
-
(2006)
Proceedings of the 39th Hawaii International Conference on System Sciences
-
-
Petrovic, S.1
Ivarez, G.A.2
Orfila, A.3
Carbo, J.4
-
20
-
-
18844388178
-
Frequent Episode Rules for Internet Anamoly Detection
-
Cambridge, MA, Aug.30-Sept.1
-
M. Qin, and K. Hwang, "Frequent Episode Rules for Internet Anamoly Detection", Preceedings of the Third IEEE International Symposium on Network Computing and Applications (IEEE-NCA-04), Cambridge, MA, Aug.30-Sept.1, 2004.
-
(2004)
Preceedings of the Third IEEE International Symposium on Network Computing and Applications (IEEE-NCA-04)
-
-
Qin, M.1
Hwang, K.2
-
21
-
-
33847256909
-
Proceedings of the First International Conference on Information and Communication Technologies, ICICT 2005 IEEE
-
27-28 August Pages(s):233-240
-
A Murali M Rao, "A Survey on Intrusion Detection Approaches", Proceedings of the First International Conference on Information and Communication Technologies, ICICT 2005 IEEE, 27-28 August 2005 Pages(s):233-240.
-
(2005)
-
-
Murali, A.1
Rao, M.2
-
22
-
-
33845941405
-
-
The MITRE Corporation, Retrieved August 1, 2007
-
N. Reed, "Security Guards for the Future Web", The MITRE Corporation, 2004. http://www.mitre.org/news/events/tech04/briefings/726.pdf . Retrieved August 1, 2007.
-
(2004)
Security Guards for the Future Web
-
-
Reed, N.1
-
24
-
-
49049121785
-
Blind SQL Injection:Are Your Web Applications Vulnerable?
-
K. Spett, "Blind SQL Injection:Are Your Web Applications Vulnerable?". SPI Dynamics, 2005.
-
(2005)
SPI Dynamics
-
-
Spett, K.1
-
25
-
-
44949237611
-
Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
-
USA
-
A. Stamos and S. Stender, "Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps", BlackHat2005, USA, 2005.
-
(2005)
BlackHat2005
-
-
Stamos, A.1
Stender, S.2
-
26
-
-
0345097561
-
-
B. Thuraisingham, Security Issues for the Semantic Web, Proceedings of the 27th Annual International Computer Software and Applications Conference COMPSAC'03, 2003
-
B. Thuraisingham, "Security Issues for the Semantic Web", Proceedings of the 27th Annual International Computer Software and Applications Conference (COMPSAC'03), 2003.
-
-
-
-
29
-
-
28444460711
-
Distributed Intrusion Detection Based On Clustering
-
Guangzhou, 18-21 August
-
Y. F. Zhang, Z. Y. Xiong, and X. Q. Wang, "Distributed Intrusion Detection Based On Clustering", Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August 2005.
-
(2005)
Proceedings of the Fourth International Conference on Machine Learning and Cybernetics
-
-
Zhang, Y.F.1
Xiong, Z.Y.2
Wang, X.Q.3
|