-
1
-
-
4544309379
-
MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications)
-
Göteborg, Sweden, 1-4 July 2001
-
Powell, D., Adelsbach, A., Cachin, C., Creese, S., Dacier, M., Deswarte, Y., McCutcheon, T., Neves, N., Pfitzmann, B., Randell, B., Stroud, R., Verissimo, P., and Waidner, M. 2001. MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications). In Supplement of the IEEE/IFIP Int. Conf. on Dependable Systems and Networks, pp. D32-D35, (Göteborg, Sweden, 1-4 July 2001).
-
(2001)
Supplement of the IEEE/IFIP Int. Conf. on Dependable Systems and Networks
-
-
Powell, D.1
Adelsbach, A.2
Cachin, C.3
Creese, S.4
Dacier, M.5
Deswarte, Y.6
McCutcheon, T.7
Neves, N.8
Pfitzmann, B.9
Randell, B.10
Stroud, R.11
Verissimo, P.12
Waidner, M.13
-
2
-
-
84855227349
-
-
Accessed March 1, 2011
-
Broadcasting & Cable, http://www.broadcastingcable.com/article/ 458457-Chilean-Miners-Rescue-Sets-Records-for-Univision.php. Accessed March 1, 2011.
-
Broadcasting & Cable
-
-
-
3
-
-
84855218295
-
-
March 1
-
Juniper Research - Low Cost Handsets & Entry Level Smartphones, http://juniperresearch.com/reports/low-cost-handsets-&-entry-level- smartphones, (March 1, 2011).
-
(2011)
Low Cost Handsets & Entry Level Smartphones
-
-
-
4
-
-
0005505737
-
-
Version 06-Apr-2001, Accessed September 1, 2010
-
Wap Forum - Wireless Transport Layer Security Specification Version 06-Apr-2001, http://www.wapforum.org/what/technical.htm. Accessed September 1, 2010.
-
Wireless Transport Layer Security Specification
-
-
-
5
-
-
0038226150
-
-
Technical Note CMU/SEI-2001-TN-001, March 2001
-
Moore, A.P., Ellison, R.J., and Linger, R.C. 2001. Attack Modeling for Information Security and Survivability. Technical Note CMU/SEI-2001-TN-001, March 2001.
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
6
-
-
0344511311
-
Dimensions of Active Behaviour
-
Paton, N.W., Díaz, O., Williams, M.H., Campin, J., Dinn, A., and Jaime, A. 1993. Dimensions of Active Behaviour. In Proceedings of 1st Int. Workshop on Rules in Database Systems, (Edinburgh - Scotland, Sep. 1993).
-
(1993)
Proceedings of 1st Int. Workshop on Rules in Database Systems, (Edinburgh - Scotland, Sep. 1993)
-
-
Paton, N.W.1
Díaz, O.2
Williams, M.H.3
Campin, J.4
Dinn, A.5
Jaime, A.6
-
7
-
-
70749141080
-
Security Protocol Testing Using Attack Trees
-
Morais, A., Martins, E., and Cavalli, A. 2009. Security Protocol Testing Using Attack Trees. In Proceedings of 2009 International Conference on Computational Science and Engineering, (Vancouver, Canada, Aug. 2009).
-
(2009)
Proceedings of 2009 International Conference on Computational Science and Engineering, (Vancouver, Canada, Aug. 2009)
-
-
Morais, A.1
Martins, E.2
Cavalli, A.3
-
8
-
-
0036041314
-
Software security vulnerability testing in hostile environments
-
Thompson, H.H., Whittaker, J.A., and Mottay, F.E. 2002. Software security vulnerability testing in hostile environments. In ACM Symposium on Applied Computing (SAC), 260-264, (Madrid, Spain 2002).
-
(2002)
ACM Symposium on Applied Computing (SAC), 260-264, (Madrid, Spain 2002)
-
-
Thompson, H.H.1
Whittaker, J.A.2
Mottay, F.E.3
-
9
-
-
0142218873
-
Fault Injection Tool for Network Security Evaluation
-
Dependable Computing. (Sep. 2003)
-
Wanner, P.C.H. and Weber, R.F. 2003. Fault Injection Tool for Network Security Evaluation. LNCS, vol. 2847/2003, Dependable Computing. Pp 127-136, (Sep. 2003).
-
(2003)
LNCS
, vol.2847
, Issue.2003
, pp. 127-136
-
-
Wanner, P.C.H.1
Weber, R.F.2
-
11
-
-
33845597598
-
Using Attack Injection to Discover New Vulnerabilities
-
2006
-
Neves, N., Antunes, J., Correia, M., Veríssimo, P., and Neves, R. 2006. Using Attack Injection to Discover New Vulnerabilities. In Proc. of the International Conference on Dependable Systems and Networks, pp 457-466, (2006).
-
(2006)
Proc. of the International Conference on Dependable Systems and Networks
, pp. 457-466
-
-
Neves, N.1
Antunes, J.2
Correia, M.3
Veríssimo, P.4
Neves, R.5
-
12
-
-
84855251501
-
-
Protos Accessed November 1, 2010
-
Protos - Security Testing of Protocol Implementations, 1999, https://www.ee.oulu.fi/research/ouspg/Protos. Accessed November 1, 2010.
-
(1999)
Security Testing of Protocol Implementations
-
-
-
16
-
-
15744365243
-
Improvements on the WTLS protocol to avoid denial of service attacks
-
2005
-
Zhang, R. and Chen, K. 2005. Improvements on the WTLS protocol to avoid denial of service attacks. Computers and Security, Elsevier Science, Vol. 24, No 1, pp. 76-82, (2005).
-
(2005)
Computers and Security, Elsevier Science
, vol.24
, Issue.1
, pp. 76-82
-
-
Zhang, R.1
Chen, K.2
-
17
-
-
0020720357
-
On the security of public-key protocols
-
1983
-
Dolev, D. and Yao, A. 1983. On the security of public-key protocols. In IEEE Transactions on Information Theory, 2(29), 198-208, (1983).
-
(1983)
In IEEE Transactions on Information Theory
, vol.2
, Issue.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
18
-
-
70749128808
-
A Kernel-based Communication Fault Injector for Dependability Testing of Distributed Systems
-
Haifa, Israel, 2005
-
Drebes, R.J., Jacques-Silva, G., da Trindade, J.F., and Weber, T.S. 2005. A Kernel-based Communication Fault Injector for Dependability Testing of Distributed Systems. In Parallel and Distributed Systems, Testing and Debugging, (Haifa, Israel, 2005).
-
(2005)
Parallel and Distributed Systems, Testing and Debugging
-
-
Drebes, R.J.1
Jacques-Silva, G.2
Da Trindade, J.F.3
Weber, T.S.4
-
19
-
-
83455264266
-
Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations
-
Cavalli, A., Martins, E., and Morais, A. 2008. Use of invariant properties to evaluate the results of fault-injection-based robustness testing of protocol implementations. In Proc. of 4th Workshop on Advances in Model Based Testing (Lillehammer, Norway, Apr 2008).
-
(2008)
Proc. of 4th Workshop on Advances in Model Based Testing (Lillehammer, Norway, Apr 2008)
-
-
Cavalli, A.1
Martins, E.2
Morais, A.3
-
20
-
-
0002670359
-
Attack Trees: Modeling Security Threats
-
December 1999
-
Schneier, B. 1999. Attack Trees: Modeling Security Threats. Dr. Dobb's Journal, (December 1999).
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
21
-
-
34250005793
-
UMLintr: A UML profile for specifying intrusions
-
Tucson, AZ, USA, 2006
-
Hussein, M. and Zulkernine, M. 2006. UMLintr: a UML profile for specifying intrusions. In Proceedings of the IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, pp. 279-288, (Tucson, AZ, USA, 2006).
-
(2006)
Proceedings of the IEEE International Conference and Workshop on the Engineering of Computer-Based Systems
, pp. 279-288
-
-
Hussein, M.1
Zulkernine, M.2
-
22
-
-
84855217648
-
-
Accessed March 1, 2011
-
Amenaza Technologies Limited - SecureITree, http://www.amenaza.com/. Accessed March 1, 2011.
-
SecureITree
-
-
-
23
-
-
0038226150
-
-
Technical Note CMU/SEI-2001-TN-001, March 2001
-
Moore, A.P., Ellison, R.J., and Linger, R.C. 2001. Attack Modeling for Information Security and Survivability. Technical Note CMU/SEI-2001-TN-001, March 2001.
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
25
-
-
84855224343
-
-
2nd Edition, May 2000
-
Bachmann, F., Bass, L., Buhman, C., Comella-Dorda, S., Long, F., Robert, J.E., Seacord, R.C., and Wallnau, K.C. 2000. Volume II:. Technical Concepts of Component-Based Software Engineering. 2nd Edition, May 2000, http://www.sei.cmu.edu/reports/00tr008.pdf.
-
(2000)
Technical Concepts of Component-Based Software Engineering
, vol.2
-
-
Bachmann, F.1
Bass, L.2
Buhman, C.3
Comella-Dorda, S.4
Long, F.5
Robert, J.E.6
Seacord, R.C.7
Wallnau, K.C.8
-
26
-
-
0003880013
-
-
Addison Wesley, 1995
-
Gamma, E., Helm, R., Johnson, R., and Vlissides, J. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley, 1995.
-
(1995)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
28
-
-
84855211882
-
-
Accessed April 1, 2010
-
Columbitech WAP Connector, http://handheld.softpedia.com/get/ Network/Columbitech-WAPConnector-35124.shtml. Accessed April 1, 2010.
-
Columbitech WAP Connector
-
-
-
29
-
-
51849145492
-
-
Accessed November 1, 2010
-
Network Packet Generator, http://www.wikistc.org/wiki/Network-packet- generator. Accessed November 1, 2010.
-
Network Packet Generator
-
-
-
30
-
-
14844322335
-
Testing network-based intrusion detection signatures using mutant exploits
-
Vigna, G., Robertson, W., and Balzarotti D. 2004. Testing network-based intrusion detection signatures using mutant exploits. In Proceedings of the 11th ACM conference on Computer and communications security, (October 25-29, 2004, Washington DC, USA).
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, (October 25-29, 2004, Washington DC, USA)
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
|