-
1
-
-
0020849266
-
Maintaining knowledge about temporal intervals
-
J. F. Allen. Maintaining knowledge about temporal intervals. Communications of the ACM, 26(11):832-843, 1983.
-
(1983)
Communications of the ACM
, vol.26
, Issue.11
, pp. 832-843
-
-
Allen, J.F.1
-
7
-
-
84944201343
-
LAMBDA: A language to model a database for detection of attacks
-
H. Debar, L. Mé, and S. F. Wu, editors, Recent Advances in Intrusion Detection (RAID 2000), Toulouse, France, Oct. 2-4, Springer-Verlag
-
F. Cuppens and R. Ortalo. LAMBDA: A language to model a database for detection of attacks. In H. Debar, L. Mé, and S. F. Wu, editors, Recent Advances in Intrusion Detection (RAID 2000), volume 1907 of LNCS, pages 197-216, Toulouse, France, Oct. 2-4, 2000. Springer-Verlag.
-
(2000)
LNCS
, vol.1907
, pp. 197-216
-
-
Cuppens, F.1
Ortalo, R.2
-
9
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
W. Lee, L. Mé, and A. Wespi, editors, Recent Advances in Intrusion Detection (RAID 2001), Davis, California, Oct. 10-12, Springer-Verlag
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In W. Lee, L. Mé, and A. Wespi, editors, Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 85-103, Davis, California, Oct. 10-12, 2001. Springer-Verlag.
-
(2001)
LNCS
, vol.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
10
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S. T. Eckmann, G. Vigna, and R. A, Kemmerer. STATL: An attack language for state-based intrusion detection. Journal of Computer Security, 10:71-103, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 71-103
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
12
-
-
84964509928
-
Information modeling for intrusion report aggregation
-
Anaheim, California, June 12-14
-
R. P. Goldman, W. Heimerdinger, S. A. Harp, C. W. Geib, V. Thomas, and R. L. Carter. Information modeling for intrusion report aggregation. In DARPA Information Survivability Conference and Exposition (DISCEX II), volume 1, pages 329-342, Anaheim, California, June 12-14, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II)
, vol.1
, pp. 329-342
-
-
Goldman, R.P.1
Heimerdinger, W.2
Harp, S.A.3
Geib, C.W.4
Thomas, V.5
Carter, R.L.6
-
15
-
-
84940110274
-
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
-
Oakland, California, May 9-12
-
U. Lindqvist and P. A. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 9-12, 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
16
-
-
84904263253
-
ADeLe: An attack description language for knowledge-based intrusion detection
-
M. Dupuy and P. Paradinas, editors, Paris, France, June 11-13
-
C. Michel and L. Mé. ADeLe: An attack description language for knowledge-based intrusion detection. In M. Dupuy and P. Paradinas, editors, Trusted Information: The New Decade Challenge: IFIP TC11 16th International Conference on Information Security (IFIP/SEC'01), pages 353-368, Paris, France, June 11-13, 2001.
-
(2001)
Trusted Information: The New Decade Challenge: IFIP TC11 16th International Conference on Information Security (IFIP/SEC'01)
, pp. 353-368
-
-
Michel, C.1
Mé, L.2
-
17
-
-
85095970245
-
Experience with EMERALD to date
-
P. G. Neumann and P. A. Porras. Experience with EMERALD to date. In Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, Apr. 9-12, 1999.
-
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, Apr. 9-12, 1999
-
-
Neumann, P.G.1
Porras, P.A.2
-
18
-
-
84883386223
-
Abstraction-based intrusion detection in distributed environments
-
Nov.
-
P. Ning, S. Jajodia, and X. S. Wang. Abstraction-based intrusion detection in distributed environments. ACM Transactions on Information and System Security, 4(4):407-452, Nov. 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.4
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
19
-
-
84958955499
-
A mission-impact-based approach to INFOSEC alarm correlation
-
A. Wespi, G. Vigna, and L. Deri, editors, Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland, Oct. 16-18
-
P. A. Porras, M. W. Fong, and A. Valdes. A mission-impact-based approach to INFOSEC alarm correlation. In A. Wespi, G. Vigna, and L. Deri, editors, Recent Advances in Intrusion Detection (RAID 2002), volume 2516 of LNCS, pages 95-114, Zurich, Switzerland, Oct. 16-18, 2002.
-
(2002)
LNCS
, vol.2516
, pp. 95-114
-
-
Porras, P.A.1
Fong, M.W.2
Valdes, A.3
-
20
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, Maryland, Oct. 7-10
-
P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th National Information Systems Security Conference, pages 353-365, Baltimore, Maryland, Oct. 7-10, 1997.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
21
-
-
0036093547
-
Model-based analysis of configuration vulnerabilities
-
C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(12):189-209, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 189-209
-
-
Ramakrishnan, C.R.1
Sekar, R.2
-
22
-
-
0033718255
-
Using model checking to analyze network vulnerabilities
-
Oakland, California, May 14-16
-
R. W. Ritchey and P. Ammann. Using model checking to analyze network vulnerabilities. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 156-165, Oakland, California, May 14-16, 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 156-165
-
-
Ritchey, R.W.1
Ammann, P.2
-
23
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Oakland, California, May 12-15
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 273-284, Oakland, California, May 12-15, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
25
-
-
0034593179
-
A requires/provides model for computer attacks
-
Ballycotton Co., Cork, Ireland, Sept. 18-21
-
S. J. Templeton and K. Levitt. A requires/provides model for computer attacks. In Proceedings of the 2000 New Security Paradigms Workshop, pages 31-38, Ballycotton Co., Cork, Ireland, Sept. 18-21, 2000.
-
(2000)
Proceedings of the 2000 New Security Paradigms Workshop
, pp. 31-38
-
-
Templeton, S.J.1
Levitt, K.2
-
26
-
-
84947603083
-
Probabilistic alert correlation
-
W. Lee, L. Mé, and A. Wespi, editors, Recent Advances in Intrusion Detection (RAID 2001), Davis, California, Oct. 10-12, Springer-Verlag
-
A. Valdes and K. Skinner. Probabilistic alert correlation. In W. Lee, L. Mé, and A. Wespi, editors, Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 54-68, Davis, California, Oct. 10-12, 2001. Springer-Verlag.
-
(2001)
LNCS
, vol.2212
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
28
-
-
85084161252
-
NetKuang-a multi-host configuration vulnerability checker
-
San Jose, California, July 22-25
-
D. Zerkle and K. Levitt. NetKuang-a multi-host configuration vulnerability checker. In Proceedings of the Sixth USENIX Security Symposium, pages 195-204, San Jose, California, July 22-25, 1996.
-
(1996)
Proceedings of the Sixth USENIX Security Symposium
, pp. 195-204
-
-
Zerkle, D.1
Levitt, K.2
|