-
1
-
-
77956393826
-
Network anomaly detection through nonlinear analysis
-
F. Palmieri and U. Fiore. Network anomaly detection through nonlinear analysis. In Computers & Security, vol. 29, no. 7, 2010, pp. 737-755.
-
(2010)
Computers & Security
, vol.29
, Issue.7
, pp. 737-755
-
-
Palmieri, F.1
Fiore, U.2
-
4
-
-
38949108264
-
Hidden Markov Models as a Support for Diagnosis: Formalization of the Problem and Synthesis of the Solution
-
IEEE CS Press
-
A. Daidone, F. Di Giandomenico, A. Bondavalli, and S. Chiaradonna. Hidden Markov Models as a Support for Diagnosis: Formalization of the Problem and Synthesis of the Solution. In Proc. of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), Oct. 2006, pp. 245-256. IEEE CS Press.
-
Proc. of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), Oct. 2006
, pp. 245-256
-
-
Daidone, A.1
Di Giandomenico, F.2
Bondavalli, A.3
Chiaradonna, S.4
-
5
-
-
70349490122
-
Probabilistic Network Fault-Diagnosis Using Cross-Layer Observations
-
IEEE CS Press
-
A. Nickelsen, J. Grnbk, T. Renier, and H.P. Schwefel. Probabilistic Network Fault-Diagnosis Using Cross-Layer Observations. In Proc. of the International Conference on Advanced Information Networking and Applications, 2009, pp. 225-232. IEEE CS Press.
-
Proc. of the International Conference on Advanced Information Networking and Applications, 2009
, pp. 225-232
-
-
Nickelsen, A.1
Grnbk, J.2
Renier, T.3
Schwefel, H.P.4
-
7
-
-
44949240818
-
Security attack ontology for web services
-
IEEE CS Press
-
V. Artem and H. Jun. Security attack ontology for web services. In Proc. of the 2th Int. Conf. on Semantics, Knowledge, and Grid, 2006, pp. 42-49, IEEE CS Press.
-
Proc. of the 2th Int. Conf. on Semantics, Knowledge, and Grid, 2006
, pp. 42-49
-
-
Artem, V.1
Jun, H.2
-
8
-
-
81255200556
-
Achieving Security by Intrusion-Tolerance Based on Event Correlation
-
Oct.
-
M. Ficco. Achieving Security by Intrusion-Tolerance Based on Event Correlation. In Special Issue on Data Dissemination for Large scale Complex Critical Infrastructures, International Journal of Network Protocols and Algorithms (NPA), vol. 2, no. 3, Oct. 2010, pp. 70-84.
-
(2010)
Special Issue on Data Dissemination for Large Scale Complex Critical Infrastructures, International Journal of Network Protocols and Algorithms (NPA)
, vol.2
, Issue.3
, pp. 70-84
-
-
Ficco, M.1
-
12
-
-
79958741058
-
An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures
-
IEEE CS Press
-
M. Ficco, A. Daidone, L. Coppolino, L. Romano, and A. Bondavalli. An Event Correlation Approach for Fault Diagnosis in SCADA Infrastructures. In Proc. of the 13th European Workshop on Dependable Computing, May 2011, pp. 15-20. IEEE CS Press.
-
Proc. of the 13th European Workshop on Dependable Computing, May 2011
, pp. 15-20
-
-
Ficco, M.1
Daidone, A.2
Coppolino, L.3
Romano, L.4
Bondavalli, A.5
-
13
-
-
84885080397
-
-
Brandeis University, Brown University, and the Massachusetts Institute of Technology
-
Borealis: Distributed Stream Processing Engine, Brandeis University, Brown University, and the Massachusetts Institute of Technology, http://www.cs.brown.edu/research/borealis/public/
-
Borealis: Distributed Stream Processing Engine
-
-
-
15
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Nov.
-
K. Julisch. Clustering intrusion detection alarms to support root cause analysis. In ACM Trans. on Information and System Security, vol. 6, no. 4, Nov. 2003, pp. 443-471.
-
(2003)
ACM Trans. on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
16
-
-
40449116802
-
A Classification of SQL-Injection Attacks and Countermeasures
-
ACM Press
-
W. G. Halfond, J. Viegas, and A. Orso. A Classification of SQL-Injection Attacks and Countermeasures. In Proc. of the the International Symposium on Secure Software Engineering, Mar. 2006, pp. 795-798, ACM Press,
-
Proc. of the the International Symposium on Secure Software Engineering, Mar. 2006
, pp. 795-798
-
-
Halfond, W.G.1
Viegas, J.2
Orso, A.3
-
17
-
-
77953769194
-
Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory
-
May
-
D. Yu and D. Frincke. Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory. In Proc. of the 43rd ACM Southeast Regional Conference, vol. 2, May 2005, pp. 142-147.
-
(2005)
Proc. of the 43rd ACM Southeast Regional Conference
, vol.2
, pp. 142-147
-
-
Yu, D.1
Frincke, D.2
-
18
-
-
84944201343
-
Lambda, a language to model a database for detection of attacks
-
Proc. of the 3rd International Symposium Recent Advances in Intrusion Detection (RAID 2000), Springer-Verlag Heidelberg
-
F. Cuppens and R. Ortalo. Lambda, A language to model a database for detection of attacks. In Proc. of the 3rd International Symposium Recent Advances in Intrusion Detection (RAID 2000), LNCS, Springer-Verlag Heidelberg, 2000, pp. 197-216.
-
(2000)
LNCS
, pp. 197-216
-
-
Cuppens, F.1
Ortalo, R.2
-
25
-
-
21944457574
-
A Comprehensive Approach to Intrusion Detection Alert Correlation
-
July
-
F. Valeur, G. Vigna, and A. Kemmerer. A Comprehensive Approach to Intrusion Detection Alert Correlation, In IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 3, July 2004, pp. 146-169.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kemmerer, A.3
|