-
1
-
-
33745850523
-
Life without firewalls
-
Singer, A., "Life Without Firewalls," The Usenix Magazine, 28(6), 2003.
-
(2003)
The Usenix Magazine
, vol.28
, pp. 6
-
-
Singer, A.1
-
2
-
-
84907332158
-
Principles for developing comprehensive network visibility
-
Allman M., Kreibich C., Paxson V., Sommer, R., Weaver N.: "Principles for Developing Comprehensive Network Visibility," USENIX Workshop on Hot Topics in Security, USENIX, 2008.
-
(2008)
USENIX Workshop on Hot Topics in Security, USENIX
-
-
Allman, M.1
Kreibich, C.2
Paxson, V.3
Sommer, R.4
Weaver, N.5
-
4
-
-
1542359967
-
A data-driven finite state machine model for analyzing security vulnerabilities
-
Chen S., Kalbarczyk Z., Xu J., Iyer R. K., "A data-driven finite state machine model for analyzing security vulnerabilities," Int'l Conference on Dependable Systems and Networks, 2003.
-
(2003)
Int'l Conference on Dependable Systems and Networks
-
-
Chen, S.1
Kalbarczyk, Z.2
Xu, J.3
Iyer, R.K.4
-
6
-
-
33845589988
-
A statistical analysis of attack data to separate attacks
-
Cukier, M., Berthier, R, Panjwani, S., Tan, S.: A statistical analysis of attack data to separate attacks. Proc. Int'l Conference on Dependable Systems and Networks, (2006).
-
(2006)
Proc. Int'l Conference on Dependable Systems and Networks
-
-
Cukier, M.1
Berthier, R.2
Panjwani, S.3
Tan, S.4
-
7
-
-
80051927476
-
-
United States Patent 5, 193, 175, March 9
-
Cutts Jr. et al, United States Patent 5,193,175, March 9, 1993
-
(1993)
-
-
Cutts, J.1
-
9
-
-
33747641698
-
Detection of complex cyber attacks
-
Gregorio-de Souza I., Berk, V. H., Giani A., et al., "Detection of Complex Cyber Attacks," SPIE 6201, 2006.
-
(2006)
SPIE
, vol.6201
-
-
Gregorio-De Souza, I.1
Berk, V.H.2
Giani, A.3
-
10
-
-
33847137650
-
Modeling network intrusion detection alerts for Correlation
-
Zhou J., Heckman M., Reynolds B., Carlson A., and Bishop M., "Modeling Network Intrusion Detection Alerts for Correlation," ACM Trans. on Info. and Sys. Security 10(1), 2007.
-
(2007)
ACM Trans. on Info. and Sys. Security
, vol.10
, pp. 1
-
-
Zhou, J.1
Heckman, M.2
Reynolds, B.3
Carlson, A.4
Bishop, M.5
-
11
-
-
0004204715
-
A database of computer attacks for the evaluation of intrusion detection systems
-
Cambridge
-
Kendall K., Smith A. C., "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems," MIT, Electrical and Computer Engineering. Cambridge 1999.
-
(1999)
MIT, Electrical and Computer Engineering
-
-
Kendall, K.1
Smith, A.C.2
-
12
-
-
0003900915
-
-
Purdue University, Tech. Rep, Department of Computer Sciences
-
Kumar, S, Spafford, E., An application of pattern matching in intrusion detection. Purdue University, Tech. Rep, Department of Computer Sciences (1994).
-
(1994)
An Application of Pattern Matching in Intrusion Detection
-
-
Kumar, S.1
Spafford, E.2
-
14
-
-
0028514027
-
A taxonomy of computer security flaws
-
Landwehr, C. et al., "A Taxonomy of Computer Security Flaws," ACM Computing Surveys, 26(3), 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, pp. 3
-
-
Landwehr, C.1
-
16
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson V., "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, 1999.
-
(1999)
Computer Networks
-
-
Paxson, V.1
-
21
-
-
2642540118
-
Modeling internet attacks
-
Tidwell T., Larson R., Fitch K., and Hale J., "Modeling Internet Attacks," Workshop on Information Assurance and Security, 2001.
-
(2001)
Workshop on Information Assurance and Security
-
-
Tidwell, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
-
26
-
-
33644535884
-
STATL: An attack language for state-based intrusion detection
-
Athens, Greece
-
Eckmann S.T., G. Vigna, and R.A. Kemmerer, "STATL: An Attack Language for State-based Intrusion Detection," Workshop on Intrusion Detection Systems, Athens, Greece, 2000.
-
(2000)
Workshop on Intrusion Detection Systems
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
|