-
1
-
-
60349088399
-
-
The 3rd Generation Partnership Project. Available at:, 2007
-
The 3rd Generation Partnership Project. Available at: http://www.3gpp.org/, 2007.
-
-
-
-
4
-
-
33645799476
-
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework
-
March
-
F. Cuppens, F. Autrel, Y. Bouzida, J. Garcia, S. Gombault, and T. Sans. Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des télécommunications, March 2006.
-
(2006)
Annales des télécommunications
-
-
Cuppens, F.1
Autrel, F.2
Bouzida, Y.3
Garcia, J.4
Gombault, S.5
Sans, T.6
-
7
-
-
28144457207
-
Nomad: A Security Model with Non Atomic Actions and Deadlines
-
F. Cuppens, N. Cuppens-Boulahia, and T. Sans. Nomad: A Security Model with Non Atomic Actions and Deadlines. In 18th IEEE CSFW, pages 186-196, 2005.
-
(2005)
18th IEEE CSFW
, pp. 186-196
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
-
9
-
-
84867339043
-
Alert Correlation in a Cooperative Intrusion Detection Framework
-
Oakland, USA
-
F. Cuppens and A. Mige. Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy, Oakland, USA, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Cuppens, F.1
Mige, A.2
-
11
-
-
34547465100
-
Enabling automated threat response through the use of a dynamic security policy
-
H. Debar, Y. Thomas, N. Boulahia-Cuppens, and F. Cuppens. Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology, 3, 2007.
-
(2007)
Journal in Computer Virology
, vol.3
-
-
Debar, H.1
Thomas, Y.2
Boulahia-Cuppens, N.3
Cuppens, F.4
-
12
-
-
33744982882
-
Obligation Policies: An Enforcement Platform
-
June
-
P. Gama and P. Ferreira. Obligation Policies: An Enforcement Platform. In 6th IEEE Policy, June 2005.
-
(2005)
6th IEEE Policy
-
-
Gama, P.1
Ferreira, P.2
-
14
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok. Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 10(1/2):5-22, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
15
-
-
0038011185
-
Constructing Attack Scenarios Through Correlation of Intrusion Alerts
-
Washington DC, USA
-
P. Ning, Y. Cui, and D. Reeves. Constructing Attack Scenarios Through Correlation of Intrusion Alerts. In proceedings of the 9th ACM conference on Computer and communication security, pages 245-254, Washington DC, USA, 2002.
-
(2002)
proceedings of the 9th ACM conference on Computer and communication security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.3
-
17
-
-
60349116977
-
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol, RFC 3261. Available at: http://www.ietf.org/rfc/rfc3261.txt, June 2002.
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol, RFC 3261. Available at: http://www.ietf.org/rfc/rfc3261.txt, June 2002.
-
-
-
-
18
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 2006.
-
(2006)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
22
-
-
0002067431
-
Netstat: A network based intrusion detection system
-
F. Vigna and R. A. Kemmerer. Netstat: A network based intrusion detection system. Journal of Computer Security, 7(1):37-71, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, F.1
Kemmerer, R.A.2
|