-
1
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
November
-
P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 217–224, November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
9
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85 – 103, 2001.
-
(2001)
Recent Advances in Intrusion Detection, LNCS
, vol.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
10
-
-
0036090387
-
STATL: An Attack Language for State-based Intrusion Detection
-
(1/2)
-
S. Eckmann, G. Vigna, and R. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71–104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
17
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
B. Morin, L. Mé, H. Debar, and M. Ducassé. M2D2: A formal data model for IDS alert correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 115–137, 2002.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
19
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, D.C., November
-
P. Ning, Y. Cui, and D. S. Reeves. Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 245–254, Washington, D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D. S.3
-
23
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
(/2)
-
C. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1/2):189–209, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1
, pp. 189-209
-
-
Ramakrishnan, C.1
Sekar, R.2
-
24
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
May
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing. Automated generation and analysis of attack graphs. In Proceedings of IEEE Symposium on Security and Privacy, May 2002.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
25
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
(/2)
-
S. Staniford, J. Hoagland, and J. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2):105–136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
|