메뉴 건너뛰기




Volumn , Issue , 2009, Pages 65-66

Threat-model-driven runtime adaptation and evaluation of intrusion detection system

Author keywords

Attack trees; Intrusion detection; Network behavior analysis; Self adaptation

Indexed keywords

ATTACK TREES; COOPERATING AGENTS; INDIVIDUAL SYSTEMS; INTRUSION DETECTION SYSTEMS; MALICIOUS BEHAVIOR; MODEL-DRIVEN; NETWORK BASED INTRUSION DETECTION SYSTEMS; NETWORK BEHAVIOR ANALYSIS; NETWORK BEHAVIORS; RUNTIME ADAPTATION; SELF-ADAPTATION; SELF-ADAPTATION MECHANISMS;

EID: 70049107018     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1555228.1555248     Document Type: Conference Paper
Times cited : (3)

References (6)
  • 1
    • 70049102987 scopus 로고    scopus 로고
    • A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-001, CMU Software Engineering Institute, March 2001.
    • A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-001, CMU Software Engineering Institute, March 2001.
  • 3
    • 0000316190 scopus 로고
    • A way to simplify truth functions
    • W. Quine. A way to simplify truth functions. American Mathematical Monthly, 62(9):627-631, 1955.
    • (1955) American Mathematical Monthly , vol.62 , Issue.9 , pp. 627-631
    • Quine, W.1
  • 4
    • 57849104685 scopus 로고    scopus 로고
    • Trust-based classifier combination for network anomaly detection
    • Cooperative Information Agents XII, of, Springer Verlag, September
    • M. Rehak, M. Pechoucek, M. Grill, and K. Bartos. Trust-based classifier combination for network anomaly detection. In Cooperative Information Agents XII, volume 5180 of LNAI/LNCS, pages 41-54. Springer Verlag, September 2008.
    • (2008) LNAI , vol.5180 , pp. 41-54
    • Rehak, M.1    Pechoucek, M.2    Grill, M.3    Bartos, K.4
  • 6
    • 57849154465 scopus 로고    scopus 로고
    • Towards trust-based acquisition of unverifiable information
    • Cooperative Information Agents XII, of, Springer Verlag, September
    • E. Staab, V. Fusenig, and T. Engel. Towards trust-based acquisition of unverifiable information. In Cooperative Information Agents XII, volume 5180 of LNAI/LNCS, pages 410-54. Springer Verlag, September 2008.
    • (2008) LNAI , vol.5180 , pp. 410-454
    • Staab, E.1    Fusenig, V.2    Engel, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.