-
1
-
-
7544240929
-
Defining event reconstruction of digital crime scenes
-
CARRIER, B. D. AND SPAFFORD, E. H. 2004. Defining event reconstruction of digital crime scenes. J. Forensic Sci.
-
(2004)
J. Forensic Sci
-
-
CARRIER, B.D.1
SPAFFORD, E.H.2
-
8
-
-
56349169788
-
-
DARPA intrusion detection scenario specific datasets. Retrieved from
-
DARPA. MIT Lincoln Lab 2000 DARPA intrusion detection scenario specific datasets. Retrieved from http://www.ll.mit.edu/IST/ideval/data/2000/index.html.
-
(2000)
MIT Lincoln Lab
-
-
-
11
-
-
1542323457
-
-
Dept. of Computer Science, University of California, Santa Barbara
-
ECKMANN, S., VIGNA, G., AND KEMMERER, R. 2000. Statl: An attack language for state-based intrusion detection. Dept. of Computer Science, University of California, Santa Barbara.
-
(2000)
Statl: An attack language for state-based intrusion detection
-
-
ECKMANN, S.1
VIGNA, G.2
KEMMERER, R.3
-
13
-
-
56349092250
-
-
eTrust. eTrust Network Forensics Solution. Available at http://www3.ca.com/.
-
eTrust. eTrust Network Forensics Solution. Available at http://www3.ca.com/.
-
-
-
-
14
-
-
56349086876
-
-
Retrieved from
-
Flowtools. flow-tools. Retrieved from http://www.splintered.net/sw/flow- tools/.
-
Flowtools. flow-tools
-
-
-
15
-
-
84883099069
-
-
IDMEF, Internet draft available at
-
IDMEF. Intrusion Detection Message Exchange Format. Internet draft available at http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-14. txt.
-
Intrusion Detection Message Exchange Format
-
-
-
16
-
-
33645762914
-
-
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES, Gap analysis report. Retrieved from
-
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES. 2004. Law enforcement tools and technologies for investigating cyber attacks: Gap analysis report. Retrieved from http://www.ists.dartmouth. edu.
-
(2004)
Law enforcement tools and technologies for investigating cyber attacks
-
-
-
17
-
-
30644476485
-
Topological analysis of network attack vulnerability
-
JAJODIA, S., NOELS, S., AND O'BERRY, B. 2005. Topological analysis of network attack vulnerability. Managing Cyber Threats: Issues, Approaches and Challenges.
-
(2005)
Managing Cyber Threats: Issues, Approaches and Challenges
-
-
JAJODIA, S.1
NOELS, S.2
O'BERRY, B.3
-
19
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
JULISCH, K. 2003. Clustering intrusion detection alarms to support root cause analysis. In ACM Trans. Inf. Syst. Secur. 443-471.
-
(2003)
ACM Trans. Inf. Syst. Secur
, pp. 443-471
-
-
JULISCH, K.1
-
21
-
-
56349140541
-
-
LEDA, Retrieved from
-
LEDA. LEDA graph library. Retrieved from http://www.algorithmic- solutions.com/enleda.htm.
-
LEDA graph library
-
-
-
23
-
-
84858486361
-
-
Available at
-
NetDetector. Available at http://www.niksun.com/Products-NetDetector.htm.
-
NetDetector
-
-
-
27
-
-
14544283296
-
Hypothesizing and reasoning about attacks missed by intrusion detection systems
-
NING, P. AND XU, D. 2004. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Trans. Inf. Syst. Secur. 7, 4, 591-627.
-
(2004)
ACM Trans. Inf. Syst. Secur
, vol.7
, Issue.4
, pp. 591-627
-
-
NING, P.1
XU, D.2
-
32
-
-
0033718255
-
Using model checking to analyze network vulnerabilities
-
Washington, DC. Safeback. SafeBack Bit Stream Backup Software. Available at
-
RITCHEY, R. W. AND AMMANN, P. 2000. Using model checking to analyze network vulnerabilities. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (SP'00). Washington, DC. Safeback. SafeBack Bit Stream Backup Software. Available at http://www.forensics-intl.com/ safeback.html.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy (SP'00)
-
-
RITCHEY, R.W.1
AMMANN, P.2
-
33
-
-
24344492645
-
ForNet: A Distributed Forensics Network
-
SHANMUGASUNDARAM, K., MEMON, N., SAVANT, A., AND BRONNIMANN, H. 2003. ForNet: A Distributed Forensics Network. In Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM'03).
-
(2003)
Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM'03)
-
-
SHANMUGASUNDARAM, K.1
MEMON, N.2
SAVANT, A.3
BRONNIMANN, H.4
-
34
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
Oakland, CA
-
SHEYNER, O., HAINES, J., JHA, S., LIPPMANN, R., AND WING, J. M. 2002. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (SP'02). Oakland, CA.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy (SP'02)
-
-
SHEYNER, O.1
HAINES, J.2
JHA, S.3
LIPPMANN, R.4
WING, J.M.5
-
36
-
-
56349142437
-
-
SIRAJ, A., M.BRIDGES, S., AND B.VAUGHN, R. 2001. Fuzzy cognitive maps for decision support in an intelligent intrusion detection system. Tech. rep., Department of Computer Science, Mississippi State University.
-
SIRAJ, A., M.BRIDGES, S., AND B.VAUGHN, R. 2001. Fuzzy cognitive maps for decision support in an intelligent intrusion detection system. Tech. rep., Department of Computer Science, Mississippi State University.
-
-
-
-
37
-
-
56349158294
-
-
Retrieved from
-
Softflowd. Retrieved from http://www.mindrot.com/softflowd.html.
-
Softflowd
-
-
|