-
1
-
-
0015475519
-
Symmetric Binary B-Tees: Data structure and maintenance algorithms
-
Bayer, R.: Symmetric Binary B-Tees: Data structure and maintenance algorithms. Acta Inf. 1, 290-306 (1972)
-
(1972)
Acta Inf
, vol.1
, pp. 290-306
-
-
Bayer, R.1
-
5
-
-
84964504906
-
Computer Attack Graph Generation Tool
-
Swiler, L.P., Phillips, C, Ellis, D., Chakerian, S.: Computer Attack Graph Generation Tool. In: Proc. DARPA Information Survivability Conference & Exposition II (2000)
-
(2000)
Proc. DARPA Information Survivability Conference & Exposition
, vol.2
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
6
-
-
30644462050
-
An Efficient, Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts
-
Wang, L., Liu, A., Jajodia, S.: An Efficient, Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. In: Proc. European Symposium on Computer Security (2005)
-
(2005)
Proc. European Symposium on Computer Security
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
-
7
-
-
4243538338
-
Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation
-
Technical Report TR-2002-14 NCSU Dept. of Computer-Science
-
Ning, P., Xu, D.: Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation. Technical Report TR-2002-14 NCSU Dept. of Computer-Science (2002)
-
(2002)
-
-
Ning, P.1
Xu, D.2
-
8
-
-
14544283296
-
Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems
-
Ning, P., Xu, D.: Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems. ACM Transactions on Information and System Security 7(4), 591-627 (2004)
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 591-627
-
-
Ning, P.1
Xu, D.2
-
9
-
-
84958963784
-
-
Ning, P., Cui, Y., Reeves, D.S.: Analyzing Intensive Intrusion Alerts Via Correlation. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, 2516. Springer, Heidelberg (2002)
-
Ning, P., Cui, Y., Reeves, D.S.: Analyzing Intensive Intrusion Alerts Via Correlation. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516. Springer, Heidelberg (2002)
-
-
-
-
10
-
-
0038011185
-
Constructing Attack Scenarios through Correlation of Intrusion Alerts
-
Ning, P., Cui, Y., Reeves, D.S.: Constructing Attack Scenarios through Correlation of Intrusion Alerts. In: Proc. 9th ACM Conference on Computer & Communications Security, pp. 245-254 (2002)
-
(2002)
Proc. 9th ACM Conference on Computer & Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
11
-
-
79958186026
-
Building Attack Scenarios through Integration of Complementary Alert Correlation Methods
-
Ning, P., Xu, D., Healy, C.G., Amant, R.S.: Building Attack Scenarios through Integration of Complementary Alert Correlation Methods. In: Proc. 11th Annual Network and Distributed System Security Symposium, pp. 97-111 (2004)
-
(2004)
Proc. 11th Annual Network and Distributed System Security Symposium
, pp. 97-111
-
-
Ning, P.1
Xu, D.2
Healy, C.G.3
Amant, R.S.4
-
15
-
-
21644435323
-
Reasoning about Complementary Intrusion Evidence
-
Zhai, Y., Ning, P., Iyer, P., Reeves, D.S.: Reasoning about Complementary Intrusion Evidence. In: Proc. 20th Annual Computer Security Applications Conference (2004)
-
(2004)
Proc. 20th Annual Computer Security Applications Conference
-
-
Zhai, Y.1
Ning, P.2
Iyer, P.3
Reeves, D.S.4
|