-
1
-
-
77952903083
-
-
W. H. Baker, A. Hutton, C. D. Hylender, C. Novak, C. Porter, B. Sartin, P. Tippett, and J. A. Valentine. Verizon 2009 Data Breach Investigations Report, 2009.
-
(2009)
Verizon 2009 Data Breach Investigations Report
-
-
Baker, W.H.1
Hutton, A.2
Hylender, C.D.3
Novak, C.4
Porter, C.5
Sartin, B.6
Tippett, P.7
Valentine, J.A.8
-
2
-
-
77950555514
-
Guidelines for evidence collection and archiving
-
Best Current Practice Feb.
-
D. Brezinski and T. Killalea. Guidelines for Evidence Collection and Archiving. RFC 3227 (Best Current Practice), Feb. 2002.
-
(2002)
RFC 3227
-
-
Brezinski, D.1
Killalea, T.2
-
3
-
-
70450124985
-
Expectations for computer security incident response
-
Best Current Practice June
-
N. Brownlee and E. Guttman. Expectations for Computer Security Incident Response. RFC 2350 (Best Current Practice), June 1998.
-
(1998)
RFC 2350
-
-
Brownlee, N.1
Guttman, E.2
-
4
-
-
78650133447
-
Incident response in virtual environments: Challenges in the cloud
-
Miami, USA, June
-
R. M. Bryan Casper. Incident response in virtual environments: Challenges in the cloud. In 22nd Annual FIRST Conference, Miami, USA, June 2010.
-
(2010)
22nd Annual FIRST Conference
-
-
Bryan Casper, R.M.1
-
5
-
-
77954327465
-
What's new about cloud computing security?
-
University of California, Berkeley, Jan
-
Y. Chen, V. Paxson, and R. H. Katz. What's new about cloud computing security? Technical Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley, Jan 2010.
-
(2010)
Technical Report UCB/EECS-2010-5, EECS Department
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
6
-
-
74049133176
-
Cloud security is not (just) virtualization security
-
Nov.
-
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni. Cloud security is not (just) virtualization security. In Proceedings of CCSW 2009: The ACM Cloud Computing Security Workshop, Nov. 2009.
-
(2009)
Proceedings of CCSW 2009: The ACM Cloud Computing Security Workshop
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
7
-
-
78650114525
-
-
Cloud Security Alliance. Trusted Cloud Initiative. http://www. cloudsecurityalliance.org/trustedcloud.html.
-
Trusted Cloud Initiative
-
-
-
8
-
-
34247893069
-
Mailbox names for common services, roles and functions
-
(Proposed Standard), May
-
D. Crocker. Mailbox Names for Common Services, Roles and Functions. RFC 2142 (Proposed Standard), May 1997.
-
(1997)
RFC 2142
-
-
Crocker, D.1
-
9
-
-
77956576296
-
The incident object description exchange format
-
(Proposed Standard), Dec.
-
R. Danyliw, J. Meijer, and Y. Demchenko. The Incident Object Description Exchange Format. RFC 5070 (Proposed Standard), Dec. 2007.
-
(2007)
RFC 5070
-
-
Danyliw, R.1
Meijer, J.2
Demchenko, Y.3
-
11
-
-
70350716910
-
The intrusion detection message exchange format (IDMEF)
-
(Experimental), Mar.
-
H. Debar, D. Curry, and B. Feinstein. The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765 (Experimental), Mar. 2007.
-
(2007)
RFC 4765
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
15
-
-
78650079030
-
-
Aug.
-
Honeynet Project & Research Alliance. Honeywall CDROM Roo, Aug. 2005. http://www.honeynet.org.
-
(2005)
Honeywall CDROM Roo
-
-
-
17
-
-
34548474923
-
-
IT Governance Institute Illinois, USA. CobiT 4.1
-
IT Governance Institute, Rolling Meadows, Illinois, USA. CobiT 4.1, 2007.
-
(2007)
Rolling Meadows
-
-
-
18
-
-
77957937277
-
Research challenges for enterprise cloud computing
-
abs/1001.3257
-
A. Khajeh-Hosseini, I. Sommerville, and I. Sriram. Research challenges for enterprise cloud computing. CoRR, abs/1001.3257, 2010.
-
(2010)
CoRR
-
-
Khajeh-Hosseini, A.1
Sommerville, I.2
Sriram, I.3
-
21
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
ACSAC 2007. Twenty-Third Annual
-
B. D. Payne, M. D. P. de Carbone, and W. Lee. Secure and flexible monitoring of virtual machines. In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, pages 385-397, 2007.
-
(2007)
Computer Security Applications Conference, 2007
, pp. 385-397
-
-
Payne, B.D.1
De Carbone, M.D.P.2
Lee, W.3
-
23
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA, November ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 199-212, New York, NY, USA, November 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
24
-
-
77950559014
-
Intrusion detection in the cloud
-
IEEE International Symposium on Los Alamitos, CA, USA IEEE Computer Society
-
S. Roschke, F. Cheng, and C. Meinel. Intrusion detection in the cloud. In Dependable, Autonomic and Secure Computing, IEEE International Symposium on, volume 0, pages 729-734, Los Alamitos, CA, USA, 2009. IEEE Computer Society.
-
(2009)
Dependable, Autonomic and Secure Computing
, pp. 729-734
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
25
-
-
78650159518
-
Forensics considerations in the next generation cloud environments
-
Miami, USA, June
-
R. Rounsavall. Forensics considerations in the next generation cloud environments. In 22nd Annual FIRST Conference, Miami, USA, June 2010.
-
(2010)
22nd Annual FIRST Conference
-
-
Rounsavall, R.1
-
26
-
-
42649130329
-
Windows memory forensics
-
N. Ruff. Windows memory forensics. Journal in Computer Virology, 4(2):83-100, 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.2
, pp. 83-100
-
-
Ruff, N.1
-
27
-
-
33745993901
-
Searching for processes and threads in microsoft windows memory dumps
-
A. Schuster. Searching for processes and threads in microsoft windows memory dumps. Digital Investigation, 3(Supplement 1):10-16, 2006.
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL. 1
, pp. 10-16
-
-
Schuster, A.1
-
29
-
-
77955298724
-
-
The CEE Board. Common event expression, 2008. http://cee.mitre.org/docs/ Common-Event-Expression-White-Paper-June-2008.pdf.
-
(2008)
Common Event Expression
-
-
-
31
-
-
0343472271
-
Handbook for computer security incident response teams (CSIRTs)
-
Carnegie Mellon SEI
-
M. West Brown, D. Stikvoort, K.-P. Kossakowski, G. Killcrece, R. Ruefle, and M. Zajicek. Handbook for Computer Security Incident Response Teams (CSIRTs). Technical Report CMU/SEI-2003-HB-002, Carnegie Mellon SEI, 2003.
-
(2003)
Technical Report CMU/SEI-2003-HB-002
-
-
West Brown, M.1
Stikvoort, D.2
Kossakowski, K.-P.3
Killcrece, G.4
Ruefle, R.5
Zajicek, M.6
|