-
1
-
-
84869662259
-
-
The OWASP Top 10 Web attacks, Sep
-
The OWASP Top 10 Web attacks, Sep. 2008., http://www.owasp.org/index.php/ Top-10-2007
-
(2008)
-
-
-
3
-
-
34248401104
-
Application layer intrusion detection for sql injection
-
Mar., ACM Press
-
F. S. Rietta, Application Layer Intrusion Detection for SQL Injection, in proc. of the 44th annual Southeast regional conference, pp. 531-536 Mar. 2006, ACM Press.
-
(2006)
Proc. of the 44th annual Southeast regional conference
, pp. 531-536
-
-
Rietta, F.S.1
-
5
-
-
21944457574
-
Comprehensive approach to intrusion detection alert correlation
-
IEEE CS Press
-
F. Valeur, G. Vigna, C. Kruegel, R.A. Kemmerer, Comprehensive approach to intrusion detection alert correlation, in IEEE Tranaction on Dependable and Secure Computing, vol.1, no.3, pp. 146-169, 2004. IEEE CS Press.
-
(2004)
IEEE Tranaction on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
6
-
-
34547241372
-
A Classification of SQL-Injection Attacks and Countermeasures
-
Mar., ACM Press
-
W. G. Halfond, J. Viegas, and A. Orso, A Classification of SQL-Injection Attacks and Countermeasures, in proc. of the International Symposium on Secure Software Engineering, pp. 795-798, Mar. 2006, ACM Press.
-
(2006)
Proc. of the International Symposium on Secure Software Engineering
, pp. 795-798
-
-
Halfond, W.G.1
Viegas, J.2
Orso, A.3
-
7
-
-
43949119446
-
-
Aug., IEEE CS Press
-
M. Haibin, and G. Jian, Intrusion Alert Correlation based on D-S Evidence Theory, in the Second International Conference on Communications and Networking (CHINACOM '07), pp. 377-381, Aug. 2007, IEEE CS Press.
-
(2007)
Intrusion Alert Correlation Based on D-S Evidence Theory in the Second International Conference on Communications and Networking (CHINACOM '07)
, pp. 377-381
-
-
Haibin, M.1
Jian, G.2
-
8
-
-
84944220475
-
Adaptive model-based monitoring for cyber attack detection
-
Oct., Springer-Verlag, Berlin Heidelberg
-
A. Valdes and K. Skinner, Adaptive, Model-based Monitoring for Cyber Attack Detection, in proc. of International Conference on Recent Advances in Intrusion Detection (RAID), LNCS no. 1907, pp. 80-92, Oct. 2000. Springer-Verlag, Berlin Heidelberg.
-
(2000)
Proc. of International Conference on Recent Advances in Intrusion Detection (RAID) LNCS no. 1907
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
9
-
-
58149092425
-
Assuring resilient time synchronization
-
Oct., IEEE CS Press
-
A. Bondavalli, A. Ceccarelli, L. Falai, Assuring Resilient Time Synchronization, in proc. of IEEE Symposium on Reliable Distributed Systems (SRDS'08), pp. 3-12, Oct. 2008, IEEE CS Press.
-
(2008)
Proc. of IEEE Symposium on Reliable Distributed Systems (SRDS'08)
, pp. 3-12
-
-
Bondavalli, A.1
Ceccarelli, A.2
Falai, L.3
-
10
-
-
84869655621
-
-
The Chi-Square Probabilities Table, Dec., at
-
The Chi-Square Probabilities Table, Dec. 2008, at http://people.richland. edu/james/lecture/m170/tbl-chi.html
-
(2008)
-
-
-
13
-
-
34547650437
-
Adaptable parsing of real-time data streams
-
Feb
-
F. Campanile, A. Cilardo, L. Coppolino, and L. Romano, Adaptable Parsing of Real-Time Data Streams, in proc. of the EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing(PDP '07), pp. 412-418, Feb. 2007.
-
(2007)
Proc. of the EUROMICRO International Conference on Parallel, Distributed and Network-based Processing(PDP '07)
, pp. 412-418
-
-
Campanile, F.1
Cilardo, A.2
Coppolino, L.3
Romano, L.4
-
18
-
-
84871349041
-
Automatically hardening web applications using precise
-
May
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans, Automatically Hardening Web Applications Using Precise, in proc. of 20th IFIP International Conference on Information Security Tainting Information, vol.181, pp. 295-307, May 2005.
-
(2005)
Proc. of 20th IFIP International Conference on Information Security Tainting Information
, vol.181
, pp. 295-307
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
19
-
-
40449091840
-
WASP: Protecting web applications using positive tainting and syntax-aware evaluation
-
Jan.-Feb
-
W.G. Halfond, A. Orso, P. Manolios, WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation, in IEEE Transactions on Software Engineering, vol.34, no.1, pp. 65-81, Jan.-Feb. 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 65-81
-
-
Halfond, W.G.1
Orso, A.2
Manolios, P.3
-
21
-
-
0142222738
-
Detection and classification of intrusions and faults using sequences of system calls
-
ACM Press
-
J. B. D. Cabrera, L. Lewis, and R. K. Mehra, Detection and classification of intrusions and faults using sequences of system calls, in Special section on data mining for intrusion detection and threat analysis, vol.30, no.4, pp. 25-34, 2001, ACM Press.
-
(2001)
Special Section on Data Mining for Intrusion Detection and Threat Analysis
, vol.30
, Issue.4
, pp. 25-34
-
-
Cabrera, J.B.D.1
Lewis, L.2
Mehra, R.K.3
-
22
-
-
49049112901
-
Evaluation of anomaly based character distribution models in the detection of SQL injection attacks
-
Mar., ACM Press
-
M. Kiani, A. Clark, G. Mohay, Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks, in proc. of Third International Conference on Availability, Reliability and Security (ARES 2008), pp. 47-55, Mar. 2008, ACM Press.
-
(2008)
Proc. of Third International Conference on Availability, Reliability and Security (ARES 2008)
, pp. 47-55
-
-
Kiani, M.1
Clark, A.2
Mohay, G.3
-
23
-
-
26444575798
-
A learning-based approach to the detection of SQL attacks
-
Jul., Springer-Verlag, Berlin Heidelberg
-
F. Valeur, D. Mutz, and G. Vigna, A Learning-Based Approach to the Detection of SQL Attacks, in proc. of the Detectiion of Intrusions and Malware and Vulnerability Assessment (DIMVA), LNCS no. 3548, pp. 123-140, Jul. 2005, Springer-Verlag, Berlin Heidelberg.
-
(2005)
Proc. of the Detectiion of Intrusions and Malware and Vulnerability Assessment (DIMVA) LNCS no. 3548
, pp. 123-140
-
-
Valeur, F.1
Mutz, D.2
Vigna, G.3
-
24
-
-
33847128476
-
Modeling user perceived unavailability due to long response times
-
Apr., IEEE CS Press
-
M. Kaaniche, M. Martinello, K. Kanoun, C.A. Melchor, Modeling user perceived unavailability due to long response times, in proc. of the 20th International Symposium on Parallel and Distributed Processing, pp. 1-8, Apr. 2005, IEEE CS Press.
-
(2005)
Proc. of the 20th International Symposium on Parallel and Distributed Processing
, pp. 1-8
-
-
Kaaniche, M.1
Martinello, M.2
Kanoun, K.3
Melchor, C.A.4
|