메뉴 건너뛰기




Volumn , Issue , 2008, Pages 118-127

Expression and deployment of reaction policies

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SYSTEMS; INTERNET; INTRUSION DETECTION; MANAGEMENT; SECURITY SYSTEMS;

EID: 60349116749     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SITIS.2008.96     Document Type: Conference Paper
Times cited : (5)

References (22)
  • 1
    • 60349088399 scopus 로고    scopus 로고
    • The 3rd Generation Partnership Project. Available at:, 2007
    • The 3rd Generation Partnership Project. Available at: http://www.3gpp.org/, 2007.
  • 7
    • 28144457207 scopus 로고    scopus 로고
    • Nomad: A Security Model with Non Atomic Actions and Deadlines
    • F. Cuppens, N. Cuppens-Boulahia, and T. Sans. Nomad: A Security Model with Non Atomic Actions and Deadlines. In 18th IEEE CSFW, pages 186-196, 2005.
    • (2005) 18th IEEE CSFW , pp. 186-196
    • Cuppens, F.1    Cuppens-Boulahia, N.2    Sans, T.3
  • 9
    • 84867339043 scopus 로고    scopus 로고
    • Alert Correlation in a Cooperative Intrusion Detection Framework
    • Oakland, USA
    • F. Cuppens and A. Mige. Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy, Oakland, USA, 2002.
    • (2002) IEEE Symposium on Security and Privacy
    • Cuppens, F.1    Mige, A.2
  • 12
    • 33744982882 scopus 로고    scopus 로고
    • Obligation Policies: An Enforcement Platform
    • June
    • P. Gama and P. Ferreira. Obligation Policies: An Enforcement Platform. In 6th IEEE Policy, June 2005.
    • (2005) 6th IEEE Policy
    • Gama, P.1    Ferreira, P.2
  • 14
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok. Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 10(1/2):5-22, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.J.4    Zadok, E.5
  • 17
    • 60349116977 scopus 로고    scopus 로고
    • J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol, RFC 3261. Available at: http://www.ietf.org/rfc/rfc3261.txt, June 2002.
    • J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol, RFC 3261. Available at: http://www.ietf.org/rfc/rfc3261.txt, June 2002.
  • 22
    • 0002067431 scopus 로고    scopus 로고
    • Netstat: A network based intrusion detection system
    • F. Vigna and R. A. Kemmerer. Netstat: A network based intrusion detection system. Journal of Computer Security, 7(1):37-71, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, F.1    Kemmerer, R.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.