-
3
-
-
0003531721
-
-
PhD thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania
-
J. Howard. An Analysis of Security Incidents on the Internet, 1989-1995. PhD thesis, Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, Pennsylvania, 1997.
-
(1997)
An Analysis of Security Incidents on the Internet, 1989-1995
-
-
Howard, J.1
-
4
-
-
84958754467
-
A brief introduction to coloured petri nets
-
Enschede, The Netherlands
-
K. Jensen. A brief introduction to coloured petri nets. In Proceeding of the TACAS'97 Workshop, pages 203-208, Enschede, The Netherlands, 1997.
-
(1997)
Proceeding of the TACAS'97 Workshop
, pp. 203-208
-
-
Jensen, K.1
-
5
-
-
0003518833
-
-
PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana
-
S. Kumar. Classification and Detection of Computer Intrusions. PhD thesis, Department of Computer Science, Purdue University, West Lafayette, Indiana, 1995.
-
(1995)
Classification and Detection of Computer Intrusions
-
-
Kumar, S.1
-
6
-
-
0002028280
-
A pattern-matching model for misuse intrusion detection
-
Baltimore, MD
-
S. Kumar and E. Spafford. A pattern-matching model for misuse intrusion detection. In Proceedings of the 17th National Computer Security Conference, volume 99, pages 11-21, Baltimore, MD, 1994.
-
(1994)
Proceedings of the 17th National Computer Security Conference
, vol.99
, pp. 11-21
-
-
Kumar, S.1
Spafford, E.2
-
7
-
-
28444482594
-
Penetration of computer systems: An overview
-
R. Lackey. Penetration of computer systems: An overview. Honeywell Computing Journal, 8(2):81-85, 1974.
-
(1974)
Honeywell Computing Journal
, vol.8
, Issue.2
, pp. 81-85
-
-
Lackey, R.1
-
8
-
-
0028514027
-
A taxonomy of computer program security flaws
-
C. Landwehr. A taxonomy of computer program security flaws. ACM Computing Surveys, 26(3):211-254, 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.1
-
10
-
-
84954536489
-
Attack modeling for information security and survivability
-
A. Moore et al. Attack modeling for information security and survivability. Survivability Systems Unlimited, 2001.
-
(2001)
Survivability Systems Unlimited
-
-
Moore, A.1
-
11
-
-
84954551439
-
-
Scottsdale, Arizona
-
Motorola Intrusion Vision, MIV. Scottsdale, Arizona, 2001. http://www.generaldynamic.com.
-
(2001)
Motorola Intrusion Vision, MIV
-
-
-
13
-
-
0003487308
-
-
John Wiley and Sons, New York
-
B. Schneier. Secrets and Lies. John Wiley and Sons, New York, 2000.
-
(2000)
Secrets and Lies
-
-
Schneier, B.1
-
16
-
-
84954565769
-
A large-scale distributed intrusion detection framework based on attack strategy analysis
-
The Boeing Company, Seattle, WA U.S.A
-
T. Wicks and M. Haung. A large-scale distributed intrusion detection framework based on attack strategy analysis. In Applied Research and Technology, The Boeing Company, Seattle, WA U.S.A, 1998.
-
(1998)
Applied Research and Technology
-
-
Wicks, T.1
Haung, M.2
|