-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparison study
-
N. Adam and J. Wortmann. Security-control methods for statistical databases: A comparison study. ACM Computing Surveys, 21(4):515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.1
Wortmann, J.2
-
5
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
Recent Advances in Intrusion Detection
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85-103, 2001.
-
(2001)
LNCS
, vol.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
8
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Nov
-
K. Julisch. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, 6(4):443-471, Nov 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
12
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, D.C, November
-
P. Ning, Y. Cui, and D. S Reeves. Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 245-254, Washington, D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
13
-
-
14544283296
-
Hypothesizing and reasoning about attacks missed by intrusion detection systems
-
November
-
P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591-627, November 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 591-627
-
-
Ning, P.1
Xu, D.2
-
15
-
-
0021389555
-
Practical data-swapping: The first steps
-
March
-
S. Reiss. Practical data-swapping: The first steps. ACM Transactions on Database Systems, 9(l):20-37, March 1984.
-
(1984)
ACM Transactions on Database Systems
, vol.9
, Issue.L
, pp. 20-37
-
-
Reiss, S.1
-
16
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
-
(1998)
-
-
Samarati, P.1
Sweeney, L.2
-
17
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Stamford, J.A. Hoagland, and J.M. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2): 105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Stamford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
|