-
1
-
-
34548114581
-
-
International CIIP (Critical Information Infrastructure Protection) Handbook, edited by A. Wenger and J. Metzger, ETH Swiss Federal Institute fo Technology Zurich, 2004
-
Dunn, M., Wigert, I., An Inventory and Analysis of Protection Policies in Fourteen Countries, International CIIP (Critical Information Infrastructure Protection) Handbook 2004, edited by A. Wenger and J. Metzger, ETH Swiss Federal Institute fo Technology Zurich, 2004.
-
(2004)
An Inventory and Analysis of Protection Policies in Fourteen Countries
-
-
Dunn, M.1
Wigert, I.2
-
5
-
-
84885782986
-
Anomaly detection approach to safeguard critical infrastructures: A knowledge engineering process on a SCADA case study
-
March
-
Lavalle, L., Balducelli, C., Vicoli, G., Anomaly Detection Approach to Safeguard Critical Infrastructures: A Knowledge Engineering Process on a SCADA Case Study, in Proceedings of Complex Network and Infrastructure Protection (CNIP'06), March 2006.
-
(2006)
Proceedings of Complex Network and Infrastructure Protection (CNIP'06)
-
-
Lavalle, L.1
Balducelli, C.2
Vicoli, G.3
-
6
-
-
84885792274
-
-
Communication from the Commission to the Council and the European Parliament, Brussels, October 2004
-
Communication from the Commission to the Council and the European Parliament Critical Infrastructure Protection in the fight against terrorism COM (704)2004, Brussels, October 2004.
-
(2004)
Critical Infrastructure Protection in the Fight Against Terrorism COM
, Issue.704
-
-
-
7
-
-
79961179005
-
Critical infrastructure: Control systems and the terrorist threat
-
The Library of Congress, Febraury
-
Shea, D. A., Critical Infrastructure: Control Systems and the Terrorist Threat, in Report for Congress RL31534. The Library of Congress, Febraury 2003
-
(2003)
Report for Congress RL31534
-
-
Shea, D.A.1
-
9
-
-
78650753809
-
Evaluating pattern recognition techniques in intrusion detection systems
-
May
-
Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C., Evaluating Pattern Recognition Techniques in Intrusion Detection Systems, in Proceedings of 5th Workshop on Pattern Recognition in Information Systems (PRIS '05), May 2005.
-
(2005)
Proceedings of 5th Workshop on Pattern Recognition in Information Systems (PRIS '05)
-
-
Esposito, M.1
Mazzariello, C.2
Oliviero, F.3
Romano, S.P.4
Sansone, C.5
-
10
-
-
84885746014
-
A distributed multi-purpose IP flow monitor
-
March
-
D'Antonio, S., Mazzariello, C., Oliviero, F., Salvi, D., A distributed multi-purpose IP flow monitor, in Proceedings of 3rd International Workshop on Internet Performance, Simulation, Monitoring and Measurement (IPS-MoMe '05), March 2005.
-
(2005)
Proceedings of 3rd International Workshop on Internet Performance, Simulation, Monitoring and Measurement (IPS-MoMe '05)
-
-
D'Antonio, S.1
Mazzariello, C.2
Oliviero, F.3
Salvi, D.4
-
11
-
-
0002067431
-
Netstat: A network based intrusion detection system
-
Vigna, G., Kemmerer, R., Netstat: a network based intrusion detection system, Journal of Computer Security, 7(1), 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Vigna, G.1
Kemmerer, R.2
-
12
-
-
0037986866
-
Detecting usual program behavior using the statistical component of the next-generation intrusion detection expert system (nides)
-
Computer Science Laboratory
-
Anderson, D., Detecting usual program behavior using the statistical component of the next-generation intrusion detection expert system (nides), Technical report, Computer Science Laboratory, 1995.
-
(1995)
Technical Report
-
-
Anderson, D.1
-
14
-
-
0003907293
-
-
Rebecca Gurley Bace, Macmillan Technical Publishing, January
-
Rebecca Gurley Bace, Intrusion Detection, Macmillan Technical Publishing, January 2000.
-
(2000)
Intrusion Detection
-
-
-
15
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
August
-
Lakhina, A., Crovella, M., Diot, C., Mining anomalies using traffic feature distributions, in Proceedings of ACM SIGCOMM '05, August 2005.
-
(2005)
Proceedings of ACM SIGCOMM '05
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
16
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
Matthew Vincent Mahoney, Network traffic anomaly detection based on packet bytes, in Proceedings of ACM SAC 03, 2003.
-
(2003)
Proceedings of ACM SAC 03
-
-
Mahoney, M.V.1
-
17
-
-
27544471466
-
-
Second Edition, Syngress
-
Baker, A. R., Caswell, B., Poor, M., Snort 2.1 Intrusion Detection - Second Edition, Syngress, 2004.
-
(2004)
Snort 2.1 Intrusion Detection
-
-
Baker, A.R.1
Caswell, B.2
Poor, M.3
-
18
-
-
33845436625
-
-
Vern Paxson and Brian Terney
-
Vern Paxson and Brian Terney, Bro reference manual, 2004
-
(2004)
Bro Reference Manual
-
-
-
19
-
-
0032630098
-
Detecting computer and network misuse through the production-based expert system toolset (p-best)
-
Oakland, California, May
-
Lindqvist, U., Porras, P., A., Detecting computer and network misuse through the production-based expert system toolset (p-best), in Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
20
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
November
-
Wenke Lee, W., Stolfo, S. J., A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security (TISSEC), 3(4):227261, November 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 227261
-
-
Wenke Lee, W.1
Stolfo, S.J.2
-
21
-
-
4544229404
-
Adam: Detecting intrusion by data mining
-
Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N., Adam: Detecting intrusion by data mining, in Proceedings of the Workshop on Information Assurance and Security, 2001.
-
(2001)
Proceedings of the Workshop on Information Assurance and Security
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
22
-
-
84885812344
-
-
Internet draft, IETF, January
-
Sadasivan, G., Brownlee, N., Claise, B., Quittek, J., Ipfix working group internet draft, architecture model for ip flow information export, Internet draft, IETF, January 2005.
-
(2005)
Ipfix Working Group Internet Draft, Architecture Model for Ip Flow Information Export
-
-
Sadasivan, G.1
Brownlee, N.2
Claise, B.3
Quittek, J.4
-
25
-
-
84885712795
-
Correlation between netflow system and network views for intrusion detection
-
Counter-terrorism, and Privacy held in conjunction with SDM
-
Abad, C., Li Y., Lakkaraju, K., Yin, X., Yurcik, W., Correlation between netflow system and network views for intrusion detection, in Proceedings of Workshop on Link Analysis, Counter-terrorism, and Privacy held in conjunction with SDM 2004.
-
(2004)
Proceedings of Workshop on Link Analysis
-
-
Abad, C.1
Li, Y.2
Lakkaraju, K.3
Yin, X.4
Yurcik, W.5
-
26
-
-
13944256121
-
Visflowconnect: Netflow visualizations of link relationships for security situational awareness
-
ACM Press
-
Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K., Visflowconnect: netflow visualizations of link relationships for security situational awareness, in Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pages 26-34, ACM Press, 2004.
-
(2004)
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
-
27
-
-
84944721192
-
Log correlation for intrusion detection: A proof of concept
-
Abad, C., Taylor, J., Sengul, C., Yurcik, W., Zhou, Y., Rowe, K., Log correlation for intrusion detection: A proof of concept, in Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC), 2003.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC)
-
-
Abad, C.1
Taylor, J.2
Sengul, C.3
Yurcik, W.4
Zhou, Y.5
Rowe, K.6
-
28
-
-
33845387429
-
Uclog: A unified, correlated logging architecture for intrusion detection
-
Li, Z., Taylor, J., Partridge, E., Zhou, Y., Yurcik, W., Abad, C., Barlow, J., Rosendale, J., Uclog: A unified, correlated logging architecture for intrusion detection, in Proceedings of the 12th International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM), 2004.
-
(2004)
Proceedings of the 12th International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM)
-
-
Li, Z.1
Taylor, J.2
Partridge, E.3
Zhou, Y.4
Yurcik, W.5
Abad, C.6
Barlow, J.7
Rosendale, J.8
|