-
1
-
-
35048866691
-
Support for automated passive host-based intrusion response
-
Durham, NC, USA: Department of Computer Science, Duke University
-
Ashish Gehani. Support for automated passive host-based intrusion response[D]. Durham, NC, USA: Department of Computer Science, Duke University, 2003
-
(2003)
-
-
Gehani, A.1
-
2
-
-
4444308274
-
Adaptive-based intrusion response
-
College Station: Texas A&M University
-
Curtis A Carver. Adaptive-based intrusion response[D]. College Station: Texas A&M University, 2001
-
(2001)
-
-
Carver, C.A.1
-
4
-
-
27544503196
-
ADEPTS: Adaptive intrusion response using attack graphs in an E-commerce environment
-
Piscataway, NJ: IEEE Computer Society
-
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, et al. ADEPTS: Adaptive intrusion response using attack graphs in an E-commerce environment[C]//Proc of the DSN-DCC Symposium 2005. Piscataway, NJ: IEEE Computer Society, 2005
-
(2005)
Proc of the DSN-DCC Symposium 2005
-
-
Foo, B.1
Wu, Y.-S.2
Mao, Y.-C.3
-
6
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Gaithersburg, USA: Information Technology Laboratory
-
Porras P A, Neumann P G. EMERALD: Event monitoring enabling responses to anomalous live disturbances[C]//Proc of the 20th National Information Systems Security Conference. Gaithersburg, USA: Information Technology Laboratory, 1997
-
(1997)
Proc of the 20th National Information Systems Security Conference
-
-
Porras, P.A.1
Neumann, P.G.2
-
7
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
White G B, Fisch E A, Pooch U W. Cooperating security managers: A peer-based intrusion detection system[J]. IEEE Network, 1996, 10(1): 20-23
-
(1996)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
8
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Wenke Lee. Toward cost-sensitive modeling for intrusion detection and response[J]. Journal of Computer Security, 2002, 10(2): 5-22
-
(2002)
Journal of Computer Security
, vol.10
, Issue.2
, pp. 5-22
-
-
Lee, W.1
-
10
-
-
84927699138
-
ADEPTS: Adaptive intrusion containment and response using attack graphs in an E-commerce environment, 2003-33
-
West Lafayette, Indiana, USA: Purdue University
-
Yu-Sung Wu, Bingrui Foo, Blake Matheny, et al. ADEPTS: Adaptive intrusion containment and response using attack graphs in an E-commerce environment, 2003-33[R]. West Lafayette, Indiana, USA: Purdue University, 2003
-
(2003)
-
-
Wu, Y.-S.1
Foo, B.2
Matheny, B.3
-
13
-
-
85084164032
-
Automated response using system-call delay
-
Berkeley, CA, USA: The Advanced Computing Systems Association
-
Somayaji A, Forrest S. Automated response using system-call delay[C]//Proc of the 9th USENIX Security Symposium. Berkeley, CA, USA: The Advanced Computing Systems Association, 2000
-
(2000)
Proc of the 9th USENIX Security Symposium
-
-
Somayaji, A.1
Forrest, S.2
-
16
-
-
54749110223
-
Design of an intrusion response system using evolutionary computation, CS401
-
Miner Circle Rolla, Missouri, USA: Computer Science Department, University of Missouri-Rolla
-
Rohit Parti. Design of an intrusion response system using evolutionary computation, CS401[R]. Miner Circle Rolla, Missouri, USA: Computer Science Department, University of Missouri-Rolla, 2003
-
(2003)
-
-
Parti, R.1
-
17
-
-
35048841338
-
Adaptive intrusion response to minimize risk over multiple network attacks
-
Sapon Tanachaiwiwat, Kai Hwang, Yue Chen. Adaptive intrusion response to minimize risk over multiple network attacks[OL]. [2002-08-27]. http://ceng.use.edu/-kaihwang/papers/ACM827.pdf
-
(2002)
-
-
Tanachaiwiwat, S.1
Hwang, K.2
Chen, Y.3
-
18
-
-
3042821266
-
Validation of sensor alert correlators
-
Joshua Maines, Dorene Kewley, Laura Tinnel, et al. Validation of sensor alert correlators[J]. IEEE Security Si-Privacy Magazine, 2003, 1(1): 46-56
-
(2003)
IEEE Security Si-Privacy Magazine
, vol.1
, Issue.1
, pp. 46-56
-
-
Maines, J.1
Kewley, D.2
Tinnel, L.3
-
19
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
Fredrik Valeur, Giovanni Vigna, Christopher Kruegel, et al. A comprehensive approach to intrusion detection alert correlation[J]. IEEE Trans on Dependable and Secure Computing, 2004, 1(3): 146-169
-
(2004)
IEEE Trans on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
-
20
-
-
33645455033
-
A survey of intrusion-detection alert aggregation and correlation techniques
-
in Chinese
-
Mu Chengpo, Huang Houkuan, Tian Shengfeng. A survey of intrusion-detection alert aggregation and correlation techniques[J]. Journal of Computer Research and Development, 2006, 43(1): 1-8 (in Chinese)
-
(2006)
Journal of Computer Research and Development
, vol.43
, Issue.1
, pp. 1-8
-
-
Mu, C.1
Huang, H.2
Tian, S.3
-
21
-
-
44649202877
-
A taxonomy of intrusion response systems, 06-05
-
Ames, Iowa, USA: Department of Computer Science, Iowa State University
-
Natalia Stakhanova, Samik Basu, Johnny Wong. A taxonomy of intrusion response systems, 06-05[R]. Ames, Iowa, USA: Department of Computer Science, Iowa State University, 2006
-
(2006)
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
23
-
-
54749089198
-
Research on automated intrusion response system
-
Beijing: Beijing Jiaotong University, in Chinese
-
Mu Chengpo. Research on automated intrusion response system[D]. Beijing: Beijing Jiaotong University, 2006 (in Chinese)
-
(2006)
-
-
Mu, C.1
-
24
-
-
3442892183
-
Rollbackable automated intrusion response system
-
in Chinese
-
Zhang Jian, Pang Jian. Rollbackable automated intrusion response system[J]. Acta Electronica Sinica, 2004, 32(5): 769-773 (in Chinese)
-
(2004)
Acta Electronica Sinica
, vol.32
, Issue.5
, pp. 769-773
-
-
Zhang, J.1
Pang, J.2
|