-
1
-
-
85071704629
-
-
Desmond J. Checkmate IDS tries to anticipate hackers actions. www.esecurityplanet.com/prodser [12 June], 2003.
-
Desmond J. Checkmate IDS tries to anticipate hackers actions. www.esecurityplanet.com/prodser [12 June], 2003.
-
-
-
-
2
-
-
3042674868
-
Checkmate intrusion protection system: Evolution or revolution
-
January 1, 2003, available at
-
Jackson G, Checkmate intrusion protection system: evolution or revolution. Psynapse Technologies, January 1, 2003, available at http://cnscenter.future.co.kr/resource/security/ids/whitepaper.pdf
-
Psynapse Technologies
-
-
Jackson, G.1
-
3
-
-
85071705767
-
-
CORE Security Technologies, July] 2003
-
Richarte G. Modern intrusion practices. CORE Security Technologies, http://wwwl.corest.com/common/showdoc.php7idx= 360&idxseccion=13&idxmen [July] 2003.
-
Modern intrusion practices
-
-
Richarte, G.1
-
5
-
-
21344433201
-
Changing definition of hackers in popular discourse
-
Chandler A. Changing definition of hackers in popular discourse. International Journal of Sociology and Law 1996; 24(2): 229-252.
-
(1996)
International Journal of Sociology and Law
, vol.24
, Issue.2
, pp. 229-252
-
-
Chandler, A.1
-
6
-
-
0042855099
-
A sociology of hackers
-
Jasanoff S. A sociology of hackers. The Sociological Review 1998; 46(4): 757-780.
-
(1998)
The Sociological Review
, vol.46
, Issue.4
, pp. 757-780
-
-
Jasanoff, S.1
-
7
-
-
85071706589
-
-
Dantu R, Kolan P. Survey of behavior profiles. http://secnet. csci.unt.edu/risk/, 2006.
-
Dantu R, Kolan P. Survey of behavior profiles. http://secnet. csci.unt.edu/risk/, 2006.
-
-
-
-
8
-
-
85071700747
-
-
Rowley I. Managing in an uncertain world: risk analysis and the bottom line. IEEE Colloquium on Systems Engineering Contribution to Increased Profitability, October 1989.
-
Rowley I. Managing in an uncertain world: risk analysis and the bottom line. IEEE Colloquium on Systems Engineering Contribution to Increased Profitability, October 1989.
-
-
-
-
10
-
-
85071706861
-
-
Foreward, by Bred Powell. Know Your Enemy Motives: The Motives and Psychology of the Black-hat Community. Honeynet Project (Whitepaper) http://www.honeynet.org/papers/motives/index.html
-
Foreward, by Bred Powell. Know Your Enemy Motives: The Motives and Psychology of the Black-hat Community. Honeynet Project (Whitepaper) http://www.honeynet.org/papers/motives/index.html
-
-
-
-
13
-
-
85071705105
-
The psychology of hackers: A new taxonomy
-
Paper presented at the, San Jose, California, Feb
-
Rogers M. The psychology of hackers: A new taxonomy. Paper presented at the RSA World Security Conference, San Jose, California, Feb 1999.
-
(1999)
RSA World Security Conference
-
-
Rogers, M.1
-
14
-
-
0002670359
-
Attack trees: Modeling security threats
-
December
-
Scheiner B. Attack trees: modeling security threats. Dr. Dobb 's Journal, December 1999 http://www.ddj.com/184411129.
-
(1999)
Dr. Dobb 's Journal
-
-
Scheiner, B.1
-
15
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
Sheyner O, Joshua HJ, Jha S, Lippmann R, Wing JM. Automated generation and analysis of attack graphs. IEEE Symposium on Security and Privacy, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Joshua, H.J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
21
-
-
0031191337
-
Sensitivity analysis in discrete Bayesian networks
-
Castillo E, Gutierrez JM, Hadi AS. Sensitivity analysis in discrete Bayesian networks. IEEE Transactions on Systems, Man, and Cybernatics 1997; 27(4): 412-423.
-
(1997)
IEEE Transactions on Systems, Man, and Cybernatics
, vol.27
, Issue.4
, pp. 412-423
-
-
Castillo, E.1
Gutierrez, J.M.2
Hadi, A.S.3
-
22
-
-
85071703375
-
-
WINBUGS-http://www.mrc-bsu.cam.ac.uk/bugs
-
WINBUGS-http://www.mrc-bsu.cam.ac.uk/bugs
-
-
-
-
23
-
-
85071705285
-
-
HUGIN DEMO-http://www.HUGIN.com/
-
HUGIN DEMO-http://www.HUGIN.com/
-
-
-
-
25
-
-
33846293304
-
Understanding complex network attack graphs through clustered adjacency matrices
-
December
-
Noel S, Jajodia S. Understanding complex network attack graphs through clustered adjacency matrices. Annual Computer Security Applications Conference, December 2005.
-
(2005)
Annual Computer Security Applications Conference
-
-
Noel, S.1
Jajodia, S.2
|