-
2
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure," Critical Information Infrastructures Security, pp. 176-187, 2010.
-
(2010)
Critical Information Infrastructures Security
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
3
-
-
78751557822
-
Multi-vendor penetration testing in the advanced metering infrastructure
-
ACM
-
S. McLaughlin, D. Podkuiko, S. Miadzvezhanka, A. Delozier, and P. McDaniel, "Multi-vendor penetration testing in the advanced metering infrastructure," in Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 2010, pp. 107-116.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 107-116
-
-
McLaughlin, S.1
Podkuiko, D.2
Miadzvezhanka, S.3
Delozier, A.4
McDaniel, P.5
-
4
-
-
33646153811
-
Formal Reasoning about Intrusion Detection Systems
-
T. Song, C. Ko, J. Alves-Foss, C. Zhang, and K. Levitt, "Formal reasoning about intrusion detection systems," in Recent Advances in Intrusion Detection. Springer, 2004, pp. 278-295. (Pubitemid 39741899)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3224
, pp. 278-295
-
-
Song, T.1
Ko, C.2
Alves-Foss, J.3
Zhang, C.4
Levitt, K.5
-
5
-
-
0030677523
-
-
sp
-
C. Ko, M. Ruschitzka, and K. Levitt, "Execution monitoring of securitycritical programs in distributed systems: A specification-based approach,"sp, p. 0175, 1997.
-
(1997)
Execution Monitoring of Securitycritical Programs in Distributed Systems: A Specification-based Approach
, pp. 0175
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
6
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
Citeseer
-
R. Sekar and P. Uppuluri, "Synthesizing fast intrusion prevention/detection systems from high-level specifications," in USENIX Security Symposium. Citeseer, 1999, pp. 63-78.
-
(1999)
USENIX Security Symposium
, pp. 63-78
-
-
Sekar, R.1
Uppuluri, P.2
-
7
-
-
2942751146
-
Experiences with specification-based intrusion detection
-
Springer
-
P. Uppuluri and R. Sekar, "Experiences with specification-based intrusion detection," in Recent Advances in Intrusion Detection. Springer, 2001, pp. 172-189.
-
(2001)
Recent Advances in Intrusion Detection
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
8
-
-
33847631104
-
Detecting intrusions specified in a software specification language
-
IEEE
-
M. Raihan and M. Zulkernine, "Detecting intrusions specified in a software specification language," in Computer Software and Applications Conference, 2005. COMPSAC 2005. 29th Annual International, vol. 1. IEEE, 2005, pp. 143-148.
-
(2005)
Computer Software and Applications Conference, 2005. COMPSAC 2005. 29th Annual International
, vol.1
, pp. 143-148
-
-
Raihan, M.1
Zulkernine, M.2
-
10
-
-
50149105845
-
Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems
-
G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, Y. Wang, X. Wang, and N. Stakhanova, "Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems," International Journal of Information and Computer Security, vol. 1, no. 1, pp. 109-142, 2007.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1
, pp. 109-142
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Wang, Y.6
Wang, X.7
Stakhanova, N.8
-
11
-
-
35248836533
-
Using specificationbased intrusion detection for automated response
-
Springer
-
I. Balepin, S. Maltsev, J. Rowe, and K. Levitt, "Using specificationbased intrusion detection for automated response," in Recent Advances in Intrusion Detection. Springer, 2003, pp. 136-154.
-
(2003)
Recent Advances in Intrusion Detection
, pp. 136-154
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.4
-
12
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
ACM
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou, "Specification-based anomaly detection: a new approach for detecting network intrusions," in Proceedings of the 9th ACM conference on Computer and communications security. ACM, 2002, pp. 265-274.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
13
-
-
74149086366
-
On the symbiosis of specification-based and anomaly-based detection
-
N. Stakhanova, S. Basu, and J. Wong, "On the symbiosis of specification-based and anomaly-based detection," computers & security, vol. 29, no. 2, pp. 253-268, 2010.
-
(2010)
Computers & Security
, vol.29
, Issue.2
, pp. 253-268
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
14
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
ACM
-
C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A specification-based intrusion detection system for AODV,"in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, 2003, pp. 125-134.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 125-134
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
15
-
-
84857759571
-
-
NASA Center for AeroSpace Information, 7121 Standard Dr, Hanover, Maryland, 21076-1320, USA, Tech. Rep.
-
E. Hansson, J. Groenkvist, K. Persson, and D. Nordqvist, "Specification- Based Intrusion Detection Combined with Cryptography Methods for Mobile Ad Hoc Networks(Policy-Baserad Intrangsdetektering foer Mobila Ad Hoc-Naet)," NASA Center for AeroSpace Information, 7121 Standard Dr, Hanover, Maryland, 21076-1320, USA, Tech. Rep., 2005.
-
(2005)
Specification- Based Intrusion Detection Combined with Cryptography Methods for Mobile Ad Hoc Networks(Policy-Baserad Intrangsdetektering Foer Mobila Ad Hoc-Naet)
-
-
Hansson, E.1
Groenkvist, J.2
Persson, K.3
Nordqvist, D.4
-
16
-
-
34547375895
-
Securing the AODV protocol using specification-based intrusion detection
-
ACM
-
H. Hassan, M. Mahmoud, and S. El-Kassas, "Securing the AODV protocol using specification-based intrusion detection," in Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks. ACM, 2006, pp. 33-36.
-
(2006)
Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks
, pp. 33-36
-
-
Hassan, H.1
Mahmoud, M.2
El-Kassas, S.3
-
17
-
-
33745657261
-
A specification-based intrusion detection model for OLSR
-
DOI 10.1007/11663812-17, Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Revised Papers
-
C. Tseng, T. Song, P. Balasubramanyam, C. Ko, and K. Levitt, "A specification-based intrusion detection model for olsr," in Recent Advances in Intrusion Detection. Springer, 2006, pp. 330-350. (Pubitemid 43973735)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3858 LNCS
, pp. 330-350
-
-
Tseng, C.H.1
Song, T.2
Balasubramanyam, P.3
Ko, C.4
Levitt, K.5
-
18
-
-
33846980793
-
Specification-based intrusion detection for H. 323-based voice over IP
-
IEEE
-
P. Truong, D. Nieh, and M. Moh, "Specification-based intrusion detection for H. 323-based voice over IP," in Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on. IEEE, 2005, pp. 387-392.
-
(2005)
Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on
, pp. 387-392
-
-
Truong, P.1
Nieh, D.2
Moh, M.3
-
20
-
-
67651108930
-
A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation
-
T. Phit and K. Abe, "A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation," IEICE Transactions on Communications, vol. 91, no. 12, pp. 3956-3965, 2008.
-
(2008)
IEICE Transactions on Communications
, vol.91
, Issue.12
, pp. 3956-3965
-
-
Phit, T.1
Abe, K.2
-
23
-
-
84857768571
-
Using acl2 to verify security properties of specification-based intrusion detection systems
-
Citeseer
-
T. Song, J. Alves-Foss, C. Ko, C. Zhang, and K. Levitt, "Using acl2 to verify security properties of specification-based intrusion detection systems," in Fourth International Workshop on the ACL2 Theorem Prover and Its Applications (ACL2-2003). Citeseer, 2003.
-
(2003)
Fourth International Workshop on the ACL2 Theorem Prover and Its Applications (ACL2-2003)
-
-
Song, T.1
Alves-Foss, J.2
Ko, C.3
Zhang, C.4
Levitt, K.5
-
24
-
-
33745673835
-
Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks
-
T. Song, C. Ko, C. Tseng, P. Balasubramanyam, A. Chaudhary, and K. Levitt, "Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks,"Formal Aspects in Security and Trust, pp. 16-33, 2006.
-
(2006)
Formal Aspects in Security and Trust
, pp. 16-33
-
-
Song, T.1
Ko, C.2
Tseng, C.3
Balasubramanyam, P.4
Chaudhary, A.5
Levitt, K.6
-
26
-
-
80052648896
-
Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions
-
IEEE
-
R. Berthier, W. Sanders, and H. Khurana, "Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions," in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on. IEEE, 2010, pp. 350-355.
-
(2010)
Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on
, pp. 350-355
-
-
Berthier, R.1
Sanders, W.2
Khurana, H.3
-
27
-
-
70350381132
-
Cumulative attestation kernels for embedded systems
-
M. LeMay and C. Gunter, "Cumulative attestation kernels for embedded systems," Computer Security-ESORICS 2009, pp. 655-670, 2010.
-
(2010)
Computer Security-ESORICS 2009
, pp. 655-670
-
-
LeMay, M.1
Gunter, C.2
-
28
-
-
67650679664
-
An intrusion detection system for wireless process control systems
-
IEEE
-
T. Roosta, D. Nilsson, U. Lindqvist, and A. Valdes, "An intrusion detection system for wireless process control systems," in Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on. IEEE, 2008, pp. 866-872.
-
(2008)
Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on
, pp. 866-872
-
-
Roosta, T.1
Nilsson, D.2
Lindqvist, U.3
Valdes, A.4
-
29
-
-
19544390827
-
System health and intrusion monitoring using a hierarchy of constraints
-
Springer
-
C. Ko, P. Brutch, J. Rowe, G. Tsafnat, and K. Levitt, "System health and intrusion monitoring using a hierarchy of constraints," in Recent Advances in Intrusion Detection. Springer, 2001, pp. 190-203.
-
(2001)
Recent Advances in Intrusion Detection
, pp. 190-203
-
-
Ko, C.1
Brutch, P.2
Rowe, J.3
Tsafnat, G.4
Levitt, K.5
-
33
-
-
58849130197
-
Usable global network access policy for process control systems
-
D. Nicol, W. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," Security & Privacy, IEEE, vol. 6, no. 6, pp. 30-36, 2008.
-
(2008)
Security & Privacy, IEEE
, vol.6
, Issue.6
, pp. 30-36
-
-
Nicol, D.1
Sanders, W.2
Singh, S.3
Seri, M.4
|