-
3
-
-
70349162582
-
Securing web applications with static and dynamic information flow tracking
-
January 7-8 San Francisco, California, USA
-
Monica S. Lam, Michael Martin, Benjamin Livshits, and John Whaley. "Securing Web Applications with Static and Dynamic Information Flow Tracking" PEPM'08, January 7-8, 2008, San Francisco, California, USA.
-
(2008)
PEPM'08
-
-
Lam, M.S.1
Martin, M.2
Livshits, B.3
Whaley, J.4
-
4
-
-
79955729147
-
-
http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20080424
-
-
-
-
5
-
-
79955710699
-
-
National Vulnerability Database (NVD), http://nvd.nist.gov.
-
-
-
-
11
-
-
34248401104
-
Application layer intrusion detection for SQL injection
-
March 10 12 Melbourne, Florida, USA
-
Frank S. Rietta. "Application Layer Intrusion Detection for SQL Injection". ACM SE'06 March 10 12, 2006, Melbourne, Florida, USA.
-
(2006)
ACM SE'06
-
-
Rietta, F.S.1
-
12
-
-
0017547820
-
A fast string-searching algorithm
-
R. Boyer and J. Moore, "A fast string- searching algorithm", Commune ACM, 1977.
-
(1977)
Commune ACM
-
-
Boyer, R.1
Moore, J.2
-
13
-
-
3042639257
-
A fast pattern-match engine for network processor-based network intrusion detection system
-
IEEE
-
R. Liu, N. Huang, C. Kao, C. Chen, C. Chou. "A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection System". Proceedings of the International Conference on Information Technology:, IEEE, Vol.1, pp.97 - 101.
-
Proceedings of the International Conference on Information Technology
, vol.1
, pp. 97-101
-
-
Liu, R.1
Huang, N.2
Kao, C.3
Chen, C.4
Chou, C.5
-
14
-
-
0142071646
-
Integrated access control and intrusion detection for web servers
-
September
-
T. Ryutov, C. Neuman, D. Kim, L. Zhou, "Integrated Access Control and Intrusion Detection for Web Servers". In IEEE transactions on parallel and distributed systems. Vol.14, No. 9, September 2003.
-
(2003)
IEEE Transactions on Parallel and Distributed Systems
, vol.14
, Issue.9
-
-
Ryutov, T.1
Neuman, C.2
Kim, D.3
Zhou, L.4
-
20
-
-
85172423269
-
JAM:Java agents for meta-learning over distributed databases
-
S. Stolfo, A.L. Prodromidis, S. Tselepis, W. Lee, D.W. Fan, P.K. Chan, "JAM:Java Agents for Meta-Learning over Distributed Databases," Proceeding of KDD-97, pp. 74-81, 1997.
-
(1997)
Proceeding of KDD-97
, pp. 74-81
-
-
Stolfo, S.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.K.6
-
21
-
-
0242456149
-
Ontology in information security: A useful theoretical foundation and methodological tool
-
V. Raskin, C.F. Hempelmann, K.E. Triezenberg, Nirenburg, "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool," Proceedings of the 2001 Workshop on New Security Paradigms (NSPW-2001), pp. 53-59, 2001.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms (NSPW-2001)
, pp. 53-59
-
-
Raskin, V.1
Hempelmann, C.F.2
Triezenberg, K.E.3
Nirenburg4
-
22
-
-
0242371001
-
Security for DAML web services: Annotation and matchmaking
-
LNCS 2870, Springer
-
G. Denker, L. Kagal, T. Finin, M. Paolucci, K. Sycara, "Security for DAML Web Services: Annotation and Matchmaking," The Semantic Web (ISWC 2003), LNCS 2870, Springer, 2003.
-
(2003)
The Semantic Web (ISWC 2003)
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
Paolucci, M.4
Sycara, K.5
-
23
-
-
79955707237
-
-
Availableat
-
DAML+OIL. Availableat:http://www.daml.org/2000/12/daml+oil.dam.
-
DAML+OIL
-
-
-
24
-
-
33746416682
-
Target-centric ontology for intrusion detection
-
August
-
J. Undercoffer, J., Pinkston, A. Joshi, T. Finin, "Target-Centric Ontology for Intrusion Detection," IJCAI Workshop on Ontologies and Distributed Systems (IJCAI'03), August, 2003.
-
(2003)
IJCAI Workshop on Ontologies and Distributed Systems (IJCAI'03)
-
-
Undercoffer, J.1
Pinkston, J.2
Joshi, A.3
Finin, T.4
-
25
-
-
33847723337
-
Lio: A user-centric intrusion detection system by using ontology approach
-
http://dx.doi.org/10.2991/jcis.2006
-
Shao-Shin Hung and Damon Shing-Min Lio:A User-centric Intrusion Detection System by using Ontology Approach. 2006 conf/jcis/2006 JCIS http://dx.doi.org/10.2991/jcis.2006.
-
2006 Conf/jcis/2006 JCIS
-
-
Hung, S.-S.1
Damon, S.-M.2
-
26
-
-
17444432965
-
Hierarchical Kohonenen Net for anomaly detection in network security
-
DOI 10.1109/TSMCB.2005.843274
-
S.T. Sarasamma, Q.A. Zhu, and J. Huff, "Hierarchel Kohonenen Net for Anomaly Detection in Network Security", IEEE Transaction on Systems, Man, and Cybernetics-Part B: Cybernetics, 35(2), 2005, pp.302-312. (Pubitemid 40535913)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
28
-
-
70349162348
-
Ontology based application level intrusion detection system by using Bayesian filter
-
PNEC Karachi, Pakistan
-
Abdul Razzaq, Ali Hur, Hafiz Farooq Ahmad, Nasir Haider "Ontology Based Application Level Intrusion Detection System by using Bayesian Filter" The 2nd IEEE International Conference on Computer, Control & Communication (IEEE-IC4) 2009, PNEC Karachi, Pakistan.
-
The 2nd IEEE International Conference on Computer, Control & Communication (IEEE-IC4) 2009
-
-
Razzaq, A.1
Hur, A.2
Ahmad, H.F.3
Haider, N.4
|