-
1
-
-
84860495162
-
Modeling multistep cyber attacks for scenario recognition
-
Washington, DC, USA
-
S. Cheung, U. Lindqvist, and M. Fong. Modeling multistep cyber attacks for scenario recognition. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX III), pages 284-292, Washington, DC, USA, 2003.
-
(2003)
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX III)
, pp. 284-292
-
-
Cheung, S.1
Lindqvist, U.2
Fong, M.3
-
4
-
-
0038289761
-
Fusing a Heterogeneous Alert Stream into Scenarios
-
Philadelphia, PA, USA
-
O. Dain and R. Cunningham. Fusing a Heterogeneous Alert Stream into Scenarios. In Proceedings of the ACM Workshop on Data Mining for Security Applications, pages 1-13, Philadelphia, PA, USA, 2001.
-
(2001)
Proceedings of the ACM Workshop on Data Mining for Security Applications
, pp. 1-13
-
-
Dain, O.1
Cunningham, R.2
-
5
-
-
0036090387
-
STATL: An Attack Language for State-based Intrusion Detection
-
S. Eckmann, G. Vigna, and R. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71-104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
9
-
-
3142623031
-
Clustering Intrusion Detection Alarms to support Root Cause Analysis
-
K. Julisch. Clustering Intrusion Detection Alarms to support Root Cause Analysis. ACM Transactions on Information and System Security, 6(4):443-471, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
10
-
-
0034301662
-
A Data Mining Analysis of RTID Alarms
-
S. Manganaris, M. Christensen, D. Zerkle, and K. Hermiz. A Data Mining Analysis of RTID Alarms. Computer Networks, 34:571-577, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
11
-
-
33847407583
-
Real-time Multistage Attack Awareness through Enhanced Intrusion Alert Clustering
-
Atlantic City, NJ, USA
-
S. Mathew, D. Britt, R. Giomundo, S. J. Upadhyaya, M. Sudit, and A. Stotz. Real-time Multistage Attack Awareness through Enhanced Intrusion Alert Clustering. In Proceedings of the Military Communications Conference (IEEE MILCOM), volume 3, pages 1801-1806, Atlantic City, NJ, USA, 2005.
-
(2005)
Proceedings of the Military Communications Conference (IEEE MILCOM)
, vol.3
, pp. 1801-1806
-
-
Mathew, S.1
Britt, D.2
Giomundo, R.3
Upadhyaya, S.J.4
Sudit, M.5
Stotz, A.6
-
12
-
-
3142632087
-
Techniques and Tools for Analyzing Intrusion Alerts
-
P. Ning, Y. Cui, D. Reeves, and D. Xu. Techniques and Tools for Analyzing Intrusion Alerts. ACM Transactions on Information and System Security (TISSEC), 7(2):274-318, 2004.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.3
Xu, D.4
-
13
-
-
14544283296
-
Hypothesizing and reasoning about attacks missed by intrusion detection systems
-
DOI 10.1145/1042031.1042036
-
P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 7(4):591-627, 2004. (Pubitemid 40302700)
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 591-627
-
-
Ning, P.1
Xu, D.2
-
15
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney. Practical Automated Detection of Stealthy Portscans. Journal of Computer Security, 10(1/2):105-136, 2002. (Pubitemid 34531414)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
16
-
-
33845963678
-
Rendering the Elephant: Characterizing Sensitive Networks for an Uncleared Audience
-
West Point, NY, USA
-
R. Stapleton-Gray and S. Gorton. Rendering the Elephant: Characterizing Sensitive Networks for an Uncleared Audience. In Proceedings of the IEEE International Information Assurance Workshop, pages 208-214, West Point, NY, USA, 2006.
-
(2006)
Proceedings of the IEEE International Information Assurance Workshop
, pp. 208-214
-
-
Stapleton-Gray, R.1
Gorton, S.2
-
17
-
-
0034593179
-
A Requires/Provides Model for Computer Attacks
-
Ballycotton, County Cork, Ireland
-
S. Templeton and K. Levitt. A Requires/Provides Model for Computer Attacks. In NSPW '00 - Proceedings of the 2000 Workshop on New Security Paradigms, pages 31-38, Ballycotton, County Cork, Ireland, 2000.
-
(2000)
NSPW '00 - Proceedings of the 2000 Workshop on New Security Paradigms
, pp. 31-38
-
-
Templeton, S.1
Levitt, K.2
|