-
1
-
-
84857170643
-
Statistical based intrusion detection framework using six sigma technique
-
Alampalayam, S., Kumar, P., Kumar, A. and Srinivasan, S. (2007) 'Statistical based intrusion detection framework using Six Sigma technique', International Journal of Computer Science and Network Security, Vol. 7, No. 10, pp.333-342.
-
(2007)
International Journal of Computer Science and Network Security
, vol.7
, Issue.10
, pp. 333-342
-
-
Alampalayam, S.1
Kumar, P.2
Kumar, A.3
Srinivasan, S.4
-
2
-
-
0000923503
-
Asymptotic theory of certain goodness-of-fit criteria based on stochastic processes
-
Anderson, T.W. and Darling, D.A. (1952) 'Asymptotic theory of certain goodness-of-fit criteria based on stochastic processes', Annals of Mathematical Statistics, Vol. 23, No. 2, pp.193-212.
-
(1952)
Annals of Mathematical Statistics
, vol.23
, Issue.2
, pp. 193-212
-
-
Anderson, T.W.1
Darling, D.A.2
-
3
-
-
0003964874
-
Next-generation intrusion detection expert system (NIDES): A summary
-
Anderson, D., Lunt, T., Javitz, H., Tamaru, A. and Valdes, A. (1995) 'Next-generation intrusion detection expert system (NIDES): a summary', Technical Report SRI-CSL-95-07, SRI International.
-
(1995)
Technical Report SRI-CSL-95-07, SRI International
-
-
Anderson, D.1
Lunt, T.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
4
-
-
0003511799
-
-
ISA, Research Triangle Park, NC
-
Berge, J. (2002) Fieldbuses for Process Control: Engineering, Operation, and Maintenance, ISA, Research Triangle Park, NC.
-
(2002)
Fieldbuses for Process Control: Engineering, Operation, and Maintenance
-
-
Berge, J.1
-
6
-
-
0036821893
-
The möbius framework and its implementation
-
Deavours, D.D., Clark, G., Courtney, T., Daly, D., Derisavi, S., Doyle, J.M., Sanders, W.H. and Webster, P.G. (2002) 'The Möbius framework and its implementation', IEEE Transactions on Software Engineering, Vol. 28, No. 10, pp.956-969.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.10
, pp. 956-969
-
-
Deavours, D.D.1
Clark, G.2
Courtney, T.3
Daly, D.4
Derisavi, S.5
Doyle, J.M.6
Sanders, W.H.7
Webster, P.G.8
-
7
-
-
0012297627
-
Computer intrusion detection based on bayes factors for comparing command transition probabilities
-
DuMouchel, W. (1999) 'Computer intrusion detection based on Bayes factors for comparing command transition probabilities', Technical Report, National Institute of Statistical Sciences.
-
(1999)
Technical Report, National Institute of Statistical Sciences
-
-
DuMouchel, W.1
-
9
-
-
84857171819
-
-
(accessed on 23 September 2011)
-
General Electric, Inc. (2010) 'Advanced boiling water reactor plant general description', available at http://www.gepower.com/prodserv/products/ nuclearenergy/en/downloads/gea14576ebwr.pdf (accessed on 23 September 2011).
-
(2010)
Advanced Boiling Water Reactor Plant General Description
-
-
-
10
-
-
26844488270
-
PAID: A probabilistic agent-based intrusion detection system
-
DOI 10.1016/j.cose.2005.06.008, PII S0167404805001033
-
Gowadia, V., Farkas, C. and Valtorta, M. (2005) 'PAID: a probabilistic agent-based intrusion detection system', Journal of Computers and Security, Vol. 24, No. 7, pp.529-545. (Pubitemid 41455413)
-
(2005)
Computers and Security
, vol.24
, Issue.7
, pp. 529-545
-
-
Gowadia, V.1
Farkas, C.2
Valtorta, M.3
-
12
-
-
68949145137
-
Attack taxonomies for the modbus protocol
-
Huitsing, P., Chandia, R., Papa, M. and Shenoi, S. (2008) 'Attack taxonomies for the modbus protocol', International Journal of Critical Infrastructure Protection, Vol. 1, pp.37-44.
-
(2008)
International Journal of Critical Infrastructure Protection
, vol.1
, pp. 37-44
-
-
Huitsing, P.1
Chandia, R.2
Papa, M.3
Shenoi, S.4
-
16
-
-
0003431468
-
-
4th ed., Duxbury Press, Boston, Mass
-
Kleinbaum, D.G., Kupper, L.L., Nizam, A. and Muller, K.E. (2007) Applied Regression Analysis and Multivariable Methods, 4th ed., Duxbury Press, Boston, Mass.
-
(2007)
Applied Regression Analysis and Multivariable Methods
-
-
Kleinbaum, D.G.1
Kupper, L.L.2
Nizam, A.3
Muller, K.E.4
-
17
-
-
84857171821
-
-
(accessed on 23 September 2011)
-
Larsen, J. (2008) 'Breakage', Blackhat Federal, http://www.blackhat.com/ presentations/bh-dc-08/Larsen/Presentation/bh-dc-08-larsen.pdf (accessed on 23 September 2011).
-
(2008)
Breakage
-
-
Larsen, J.1
-
18
-
-
0004029130
-
-
2nd ed., Springer, New York, NY
-
Lehmann, E.L. and Casella, G. (1998) Theory of Point Estimation, 2nd ed., Springer, New York, NY.
-
(1998)
Theory of Point Estimation
-
-
Lehmann, E.L.1
Casella, G.2
-
19
-
-
84946216263
-
Utilizing statistical characteristics of N-grams for intrusion detection
-
IEEE Computer Society, Washington, DC, USA
-
Li, Z., Das, A. and Nandi, S. (2003) 'Utilizing statistical characteristics of N-grams for intrusion detection', Proceedings of the 2003 International Conference on Cyberworlds, IEEE Computer Society, Washington, DC, USA.
-
(2003)
Proceedings of the 2003 International Conference on Cyberworlds
-
-
Li, Z.1
Das, A.2
Nandi, S.3
-
20
-
-
0003876171
-
-
(accessed on 23 September 2011)
-
Mathworks Inc. (2011a) 'Matlab - the language of technical computing', available at http://www.mathworks.com/products/Matlab/ (accessed on 23 September 2011).
-
(2011)
Matlab - The Language of Technical Computing
-
-
-
21
-
-
84876894014
-
-
(accessed on 23 September 2011)
-
Mathworks Inc. (2011b) 'Simulink', available at http://www.mathworks.com/ products/simulink/ (accessed on 23 September 2011).
-
(2011)
Simulink
-
-
-
22
-
-
84857176441
-
-
(accessed on 23 September 2011)
-
Mathworks Inc. (2011c) 'Real-time workshop', available at http://www.mathworks.com/products/rtw/ (accessed on 23 September 2011).
-
(2011)
Real-time Workshop
-
-
-
23
-
-
77951175250
-
-
(accessed on 23 September 2011)
-
ModBus Organization (2004a) 'ModBus application protocol specification', available at http://www.modbus.org/docs/Modbus-Application-Protocol-V1-1b.pdf (accessed on 23 September 2011).
-
(2004)
ModBus Application Protocol Specification
-
-
-
24
-
-
36248949073
-
-
(accessed on 20 September 2011)
-
ModBus Organization (2004b) 'ModBus messaging on TCP/IP implementation guide', available at http://www.modbus.org/docs/Modbus-Messaging-Implementation- Guide-V1-0b.pdf (accessed on 20 September 2011).
-
(2004)
ModBus Messaging on TCP/IP Implementation Guide
-
-
-
25
-
-
67650270957
-
Petri net
-
Petri, A.C. and Reisig, W. (2008) 'Petri net', Scholarpedia, Vol. 3, No. 4, p.6477.
-
(2008)
Scholarpedia
, vol.3
, Issue.4
, pp. 6477
-
-
Petri, A.C.1
Reisig, W.2
-
27
-
-
84857176440
-
SCADA protocol vulnerabilities
-
Springer, to appear
-
Rrushi, J.L. (2011) 'SCADA protocol vulnerabilities', Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense, Springer, to appear.
-
(2011)
Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense
-
-
Rrushi, J.L.1
-
28
-
-
0000086137
-
A unified approach for specifying measures of performance, dependability, and performability
-
Avizienis, A., Kopetz, H., Laprie, J. (Eds.) Springer-Verlag, New York, NY
-
Sanders, W.H. and Meyer, J.F. (1991) 'A unified approach for specifying measures of performance, dependability, and performability', in Avizienis, A., Kopetz, H., Laprie, J. (Eds.): Dependable Computing and Fault-Tolerant Systems, Vol. 4, pp.215-237, Springer-Verlag, New York, NY.
-
(1991)
Dependable Computing and Fault-tolerant Systems
, vol.4
, pp. 215-237
-
-
Sanders, W.H.1
Meyer, J.F.2
-
29
-
-
84944319215
-
Stochastic activity networks: Formal definitions and concepts
-
Sanders, W.H. and Meyer, J.F. (2001) 'Stochastic activity networks: formal definitions and concepts', Lecture Notes in Computer Science, No. 2090, pp.315-343. (Pubitemid 33332568)
-
(2001)
Lecture Notes in Computer Science
, Issue.2090
, pp. 315-343
-
-
Sanders, W.H.1
Meyer, J.F.2
-
33
-
-
84857161235
-
-
(accessed on 23 September 2011)
-
Wuollet, C., Romanenko, A., Jack, H., Baum, J., Orozco, J.C. and de Sousa, M.J.R. (2008) 'MatPLC', available at http://mat.sourceforge.net (accessed on 23 September 2011).
-
(2008)
-
-
Wuollet, C.1
Romanenko, A.2
Jack, H.3
Baum, J.4
Orozco, J.C.5
De Sousa, M.J.R.6
|