-
1
-
-
36448967526
-
Attack patterns: A new forensic and design tool
-
Orlando, FL, January 29-31, 2007; Also available in Advances in Digital Forensics III, P. Craiger and S. Shenoi (eds.). Springer/IFIP
-
Fernandez EB, Pelaez JC, Larrondo-Petrie MM. Attack patterns: a new forensic and design tool, Proceedings of the Third Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, January 29-31, 2007; Also available in Advances in Digital Forensics III, P. Craiger and S. Shenoi (eds.). Springer/IFIP, 2007, 345-357.
-
(2007)
Proceedings of The Third Annual Ifip Wg 11.9 International Conference On Digital Forensics
, pp. 345-357
-
-
Fernandez, E.B.1
Pelaez, J.C.2
Larrondo-Petrie, M.M.3
-
2
-
-
0004101993
-
-
Wiley: New York
-
Buschmann F, Meunier R, Rohnert H, Sommerlad P, Stal M. Pattern-Oriented Software Architecture: A System of Patterns (Vol. 1). Wiley: New York, 1996.
-
(1996)
Pattern-oriented Software Architecture: A System of Patterns
, vol.1
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
3
-
-
33750050331
-
-
Wiley: West Sussex, England
-
Schumacher M, Fernandez EB, Hybertson D, Buschmann F, Sommerlad P. Security Patterns: Integrating Security and Systems Engineering. Wiley: West Sussex, England 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
4
-
-
84947618629
-
-
CERT Coordination Center, Carnegie Mellon University. 2007
-
CERT Coordination Center, Carnegie Mellon University. 2007. http://www.cert.org
-
-
-
-
5
-
-
84947611720
-
-
Symantec Corporation, Antivirus Research Center, 2008
-
Symantec Corporation, Antivirus Research Center, 2008. http://www.symantec.com
-
-
-
-
7
-
-
74849122857
-
-
[Accessed 10 June, 2007]
-
Collier M. 2004. The value of VoIP security. http://www. call-centermagazine.com/shared/printableArticle.jhtml?articleID= 22103933 [Accessed 10 June, 2007].
-
(2004)
The Value of Voip Security
-
-
Collier, M.1
-
8
-
-
84947619090
-
-
The Communications Research Network (CRN)., February2006
-
The Communications Research Network (CRN). VoIP loop-holeaidsservicedeniers?February2006.http://www.ssi.org.br/ english/
-
Voip Loop-holeaidsservicedeniers?
-
-
-
9
-
-
33751052258
-
Multiple design patterns for voice over IP (VoIP) security
-
WIA 2006), Phoenix, AZ, April
-
Anwar Z, Yurcik W, Johnson R, Hafiz M, Campbell R. Multiple design patterns for voice over IP (VoIP) security. Proceedings of the IEEE Workshop on Information Assurance (WIA 2006), Phoenix, AZ, April 2006.
-
Proceedings of The Ieee Workshop On Information Assurance
, pp. 2006
-
-
Anwar, Z.1
Yurcik, W.2
Johnson, R.3
Hafiz, M.4
Campbell, R.5
-
12
-
-
36448945691
-
A security pattern for rule-based intrusion detection
-
Otaniemi, Finland, September
-
Fernandez EB, Kumar A. A security pattern for rule-based intrusion detection, Proceedings of the Nordic Conference on PatternLanguagesofPrograms,(VikingPLoP2005),Otaniemi, Finland, 23-25 September 2005.
-
(2005)
Proceedings of The Nordic Conference On Patternlanguagesofprograms,(vikingplop2005)
, pp. 23-25
-
-
Fernandez, E.B.1
Kumar, A.2
-
13
-
-
73649140895
-
Security pat-terns for voice over IP networks
-
Also available at
-
Fernandez EB, Pelaez JC, Larrondo-Petrie MM. Security pat-terns for voice over IP networks. Journal of Software 2007; 2(2): 19-29. Also available at http://www.academypublisher. com/jsw
-
(2007)
Journal of Software
, vol.2
, Issue.2
, pp. 19-29
-
-
Fernandez, E.B.1
Pelaez, J.C.2
Larrondo-Petrie, M.M.3
-
14
-
-
24344492645
-
-
Department of Computer and Information Science, Polytechnic University: Brooklyn, NY
-
Shanmugasundaram K. ForNet: A Distributed Forensics Network. Department of Computer and Information Science, Polytechnic University: Brooklyn, NY, 2003.
-
(2003)
Fornet: A Distributed Forensics Network
-
-
Shanmugasundaram, K.1
-
17
-
-
84947612850
-
-
[Accessed 28 April, 2008]
-
Schulzrinne H, Casner S, Frederick R, Jacobson V. 1996. Request for comments: 1889, RTP: a transport protocol for real-time applications. http://www.ietf.org/rfc/rfc1889.txt [Accessed 28 April, 2008].
-
(1996)
Request For Comments: 1889, Rtp: A Transport Protocol For Real-time Applications
-
-
Schulzrinne, H.1
Casner, S.2
Frederick, R.3
Jacobson, V.4
-
19
-
-
74849098352
-
-
[Accessed 18 June, 2007]
-
Pogar N. 2003. Data security in a converged network. http:// www.computerworld.com/printthis/2003/0,4814,83624,00.html [Accessed 18 June, 2007].
-
(2003)
Data Security In a Converged Network
-
-
Pogar, N.1
-
22
-
-
74849100589
-
-
National Institute of Standards and Technology, Applying Forensic Techniques to Incident Response, August
-
National Institute of Standards and Technology. Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response, August 2005.
-
(2005)
Guide to Computer and Network Data Analysis
-
-
-
23
-
-
74849086848
-
Using signaling information in telecom network forensics
-
National Center for Forensic Science, Orlando, Florida, February
-
Moore T, Meehan A, Manes G, Shenoi S. Using signaling information in telecom network forensics. Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005.
-
(2005)
Advances In Digital Forensics: Ifip International Conference On Digital Forensics
, pp. 13-16
-
-
Moore, T.1
Meehan, A.2
Manes, G.3
Shenoi, S.4
-
24
-
-
84947616286
-
-
Wikipedia, the free encyclopedia, [Accessed 17 June, 2007],
-
Wikipedia, the free encyclopedia. http://en.wikipedia.org/ wiki/Hepting vs. AT&T [Accessed 17 June, 2007].
-
-
-
-
26
-
-
84947616436
-
-
The International Engineering Consortium, [Accessed 16 May, 2007]
-
The International Engineering Consortium. Fraud analysis in IP and Next Generation Networks. http://www.iec.org/tutorials/ fraud analysis/ [Accessed 16 May, 2007].
-
Fraud Analysis In Ip and Next Generation Networks
-
-
-
27
-
-
84947616075
-
Arrests reveal vulnerability of Web phone service to fraud."
-
June 8
-
Searcey D, Young S. Arrests reveal vulnerability of Web phone service to fraud." The Wall Street Journal, June 8, 2006.
-
(2006)
The Wall Street Journal
-
-
Searcey, D.1
Young, S.2
-
28
-
-
74849109675
-
-
Newsweek International, March 19
-
Sutherland B. Stealing minutes. Newsweek International, March 19, 2007.
-
(2007)
Stealing Minutes
-
-
Sutherland, B.1
-
29
-
-
79951732736
-
-
[Accessed 1 June, 2007]
-
Collier M. 2005. Basic vulnerability issues for SIP. http://voipsecurityblog.typepad.com/marks voip security blog/ 2007/03/index.html [Accessed 1 June, 2007].
-
(2005)
Basic vulnerability issues for SIP
-
-
Collier, M.1
-
30
-
-
74849136023
-
-
Defense Information Systems Agency., Technical Implementation Guide, Version 2, Release 0. 30, December
-
Defense Information Systems Agency. IP Telephony & Voice over Internet protocol--Security Technical Implementation Guide, Version 2, Release 0. 30 December 2004.
-
(2004)
Ip Telephony & Voice Over Internet Protocol--security
-
-
-
31
-
-
84947613916
-
-
[Accessed24May, 2007]
-
Thermos P. 2004. Two attacks against VoIP. http://www.securityfocus.com/infocus/1862 [Accessed24May, 2007].
-
(2004)
Two Attacks Against Voip
-
-
Thermos, P.1
-
32
-
-
74849131946
-
The use of transport layer security (TLS) in the session initiation protocol (SIP). SIP WG Internet draft
-
February 26
-
Gurbani V, Jeffrey A. The use of transport layer security (TLS) in the session initiation protocol (SIP). SIP WG Internet draft, February 26, 2006.
-
(2006)
SIP WG Internet draft
-
-
Gurbani, V.1
Jeffrey, A.2
-
33
-
-
73649140895
-
Security patterns for voice over IP networks
-
Also available at:
-
Fernandez EB, Pelaez JC, Larrondo-Petrie MM. Security patterns for voice over IP networks. Journal of Software 2007; 2(2): 19-29. Also available at: http://www.academypublisher.com/jsw
-
(2007)
Journal of Software
, vol.2
, Issue.2
, pp. 19-29
-
-
Fernandez, E.B.1
Pelaez, J.C.2
Larrondo-Petrie, M.M.3
-
34
-
-
33750050331
-
-
Wiley: Sussex, England
-
Schumacher M, Fernandez EB, Hybertson D, Buschmann F, Sommerlad P. Security Patterns: Integrating Security and Systems Engineering. Wiley: Sussex, England, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
35
-
-
36448945691
-
A security pattern for rule-based intrusion detection
-
VikingPLoP2005),Otaniemi, Finland, September
-
Fernandez EB, Kumar A. A security pattern for rule-based intrusion detection. Proceedings of the Nordic Conference on PatternLanguagesofPrograms,(VikingPLoP2005),Otaniemi, Finland, 23-25 September 2005.
-
(2005)
Proceedings of The Nordic Conference On Patternlanguagesofprograms
, pp. 23-25
-
-
Fernandez, E.B.1
Kumar, A.2
-
37
-
-
0028495490
-
Requirements specification for process control systems
-
No. 9, September 1994, IEEE Computer Society Press, Los Alamitos, California, USA
-
Leveson NG, Heimdahl MPE, Hildreth H, Reese JD. Requirements specification for process control systems. IEEE Transactions on Software Engineering, Vol. 20, No. 9, September 1994, IEEE Computer Society Press, Los Alamitos, California, USA (1994) 684-707.
-
(1994)
Ieee Transactions On Software Engineering
, vol.20
, pp. 684-707
-
-
Leveson, N.G.1
Heimdahl, M.P.E.2
Hildreth, H.3
Reese, J.D.4
-
38
-
-
77950904346
-
An attack graph based prob-abilistic security metrics?
-
(DBSEC 2008), London, UK, July
-
Wang L, Singhal A, Jajodia S. An attack graph based prob-abilistic security metrics? Proceedings of 22nd IFIP WG 11.3 Working Conference on Data and Application Security (DBSEC 2008), London, UK, July 2008.
-
(2008)
Proceedings of 22nd Ifip Wg 11.3 Working Conference On Data and Application Security
-
-
Wang, L.1
Singhal, A.2
Jajodia, S.3
-
39
-
-
33947149035
-
An ontoilogy description for SIP security flaws
-
Geneiatakis D, Lambrinoudakis C. An ontoilogy description for SIP security flaws. Computer Communications 2007; 30(6): 1367-1374.
-
(2007)
Computer Communications
, vol.30
, Issue.6
, pp. 1367-1374
-
-
Geneiatakis, D.1
Lambrinoudakis, C.2
-
40
-
-
84947618207
-
-
Defense Personnel Security Research Center (PERSEREC). Employees Guide to Security Responsibilities, Version 1.0
-
Defense Personnel Security Research Center (PERSEREC). Employees Guide to Security Responsibilities, Version 1.0.
-
-
-
-
41
-
-
84899175349
-
A methodology to devlop secure systems using patterns
-
(Chapter5),MouratidisH,GiorginiP(eds).IDEA Press
-
Fernandez EB, Larrondo-Petrie MM, Sorgente T, Van-Hilst M. A methodology to devlop secure systems using patterns. In Integrating Security and Software Engineering: Advances and Future Vision(Chapter5),MouratidisH,GiorginiP(eds).IDEA Press, 2006; 107-126.
-
(2006)
In Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Van-Hilst, M.4
-
43
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
Mouratidis H, Giorgini P (eds). IDEA Press
-
Fernandez EB, Larrondo-Petrie MM, Sorgente T, Van-Hilst M. A methodology to develop secure systems using patterns. In Integrating Security And Software Engineering: Advances and future Vision, Mouratidis H, Giorgini P (eds). IDEA Press: 2006; 107-126.
-
(2006)
In Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Van-Hilst, M.4
|