-
1
-
-
83155166069
-
-
http://www.top500.org - TOP 500 List.
-
-
-
-
2
-
-
33847137650
-
Modeling network intrusion detection alerts for correlation
-
J. Zhou, M. Heckman, B. Reynolds, A. Carlson, M. Bishop, "Modeling network intrusion detection alerts for correlation", ACM Transactions on Information and System Security, 10(1), 2007.
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.1
-
-
Zhou, J.1
Heckman, M.2
Reynolds, B.3
Carlson, A.4
Bishop, M.5
-
4
-
-
80051938080
-
Analysis of Security Data from a Large Computing Organization
-
A. Sharma, Z. Kalbarczyk, J. Barlow, R. Iyer, "Analysis of Security Data from a Large Computing Organization", in Proc. of the International Conference on Dependable Systems and Networks, 2011, 506-517.
-
Proc. of the International Conference on Dependable Systems and Networks, 2011
, pp. 506-517
-
-
Sharma, A.1
Kalbarczyk, Z.2
Barlow, J.3
Iyer, R.4
-
7
-
-
84879840092
-
-
http://www.ncsa.illinois.edu/BlueWaters - National Center for Supercomputing Applications, Blue Waters project.
-
Blue Waters Project
-
-
-
8
-
-
77950347409
-
A view of cloud computing
-
4, April
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "A view of cloud computing", Commun. ACM 53, 4, April 2010, 50-58.
-
(2010)
Commun. ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
9
-
-
0003993831
-
-
2nd ed., San Francisco, CA, Dellen
-
W. Mendenhall, T. Sincich, "Statistic for the Engineering and Computer Sciences", 2nd ed., San Francisco, CA, Dellen, 1988.
-
(1988)
Statistic for the Engineering and Computer Sciences
-
-
Mendenhall, W.1
Sincich, T.2
-
10
-
-
70350402262
-
-
Reihe Informatik TR-2008-006, University of Mannheim, Germany
-
T. Holz, M. Engelberth, F. Freiling, "Learning More About the Underground Economy: a Case-Study of Keyloggers and Dropzones", Reihe Informatik TR-2008-006, University of Mannheim, Germany.
-
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
11
-
-
69549135546
-
Internet Banking: Client-Side Attacks and Protection Mechanisms
-
June
-
R. Oppliger, R. Rytz, T. Holderegger, "Internet Banking: Client-Side Attacks and Protection Mechanisms", IEEE Computer Security, 42(6), June 2009.
-
(2009)
IEEE Computer Security
, vol.42
, Issue.6
-
-
Oppliger, R.1
Rytz, R.2
Holderegger, T.3
-
16
-
-
33845589988
-
A Statistical Analysis of Attack Data to Separate Attacks
-
M. Cukier, R. Berthier, S. Panjwani, S. Tan, "A Statistical Analysis of Attack Data to Separate Attacks", in Proc. of the International Conference on Dependable Systems and Networks, 2006, 383-392.
-
Proc. of the International Conference on Dependable Systems and Networks, 2006
, pp. 383-392
-
-
Cukier, M.1
Berthier, R.2
Panjwani, S.3
Tan, S.4
-
17
-
-
4143149628
-
A generic framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, "A generic framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data", in Data Mining for Security Applications, Kluwer, 2002.
-
(2002)
Data Mining for Security Applications
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
18
-
-
16444376120
-
Two-factor authentication: Too little, too late
-
B. Schneier, "Two-factor authentication: too little, too late", Communications of the ACM, 48(4), 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
-
-
Schneier, B.1
-
19
-
-
83155166043
-
Measuring Network Security Using Bayesian- Network-based Attack Graphs
-
M. Frigault, L. Wang, "Measuring Network Security Using Bayesian- Network-based Attack Graphs", STPSA 2008.
-
STPSA 2008
-
-
Frigault, M.1
Wang, L.2
-
20
-
-
77950834855
-
Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network modeling
-
September
-
G. Modelo-Howard, S. Bagchi, G. Lebanon, "Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network modeling". RAID, September 2008.
-
(2008)
RAID
-
-
Modelo-Howard, G.1
Bagchi, S.2
Lebanon, G.3
-
22
-
-
77956574602
-
Using Bayesian Networks for Cyber Security Analysis
-
P. Xie, J.H. Li, X. Ou, P. Liu, R. Levy, "Using Bayesian Networks for Cyber Security Analysis", in Proc. of the International Conference on Dependable Systems and Networks, 2010, 211-220.
-
Proc. of the International Conference on Dependable Systems and Networks, 2010
, pp. 211-220
-
-
Xie, P.1
Li, J.H.2
Ou, X.3
Liu, P.4
Levy, R.5
-
23
-
-
47849131097
-
Intensive use of Bayesian belief networks for the unified, flexible, and adaptable analysis of misuses and anomalies in network intrusion detection and prevention systems
-
P.G. Bringas, "Intensive use of Bayesian belief networks for the unified, flexible, and adaptable analysis of misuses and anomalies in network intrusion detection and prevention systems", in Proc. of the 18th Int.l Conf- on Database and Expert Systems Applications, 2002.
-
Proc. of the 18th Int.l Conf- on Database and Expert Systems Applications, 2002
-
-
Bringas, P.G.1
-
24
-
-
84944737204
-
Bayesian Event Classification for Intrusion Detection
-
C. Kruegel, D. Mutz, W. Robertson, F. Valuer, "Bayesian Event Classification for Intrusion Detection", Proc. ACSAC 03, Dec. 2003.
-
Proc. ACSAC 03, Dec. 2003
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valuer, F.4
|