-
1
-
-
84944115205
-
-
June
-
The Aglets Software Development Kit (ASDK). http://sourceforge.net/projects/aglets/, June 2002.
-
(2002)
-
-
-
3
-
-
84955580290
-
An Architecture for Intrusion Detection Using Autonomous Agents
-
J.S. Balasubramaniy an, J.O.Garcia-Fernandez, D. Isacoff, E.H. Spafford, and D. Zam boni. An Architecture for Intrusion Detection Using Autonomous Agents. In Proceedings of ACSAC’98, pages 13–24, 1998.
-
(1998)
Proceedings of ACSAC’98
, pp. 13-24
-
-
Balasubramaniy An, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.H.4
Zam Boni, D.5
-
4
-
-
84944043420
-
-
In IIS Indexing Service DLL.Advisory CA-2001-19, July
-
CER T/CC. “Code Red Worm” Exploiting Buffer Overflow In IIS Indexing Service DLL.Advisory CA-2001-19, July 2001.
-
(2001)
Code Red Worm” Exploiting Buffer Overflow
-
-
-
5
-
-
0002380598
-
Securit y Issues in Mobile Code Systems
-
In G. Vigna, editor, Springer-V erlag, June
-
D.M. Chess.Securit y Issues in Mobile Code Systems. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS, pages 1–14.Springer-V erlag, June 1998.
-
(1998)
Mobile Agents and Security, Volume 1419 of LNCS
, pp. 1-14
-
-
Chess, D.M.1
-
7
-
-
15044348810
-
-
PhD thesis, Department of Computer Science, UCSB, Santa Barbara, CA, June
-
S. T. Eckmann. The STATL Attack Detection Language. PhD thesis, Department of Computer Science, UCSB, Santa Barbara, CA, June 2002.
-
(2002)
The STATL Attack Detection Language
-
-
Eckmann, S.T.1
-
8
-
-
0002584180
-
Security for Mobile Agents: Issues and Requirements
-
Baltimore, MD, USA, October
-
W.M. Farmer, J.D. Guttman, and V. Swarup. Security for Mobile Agents: Issues and Requirements. In Proc. of the 19th National Information Systems Security Conf., pages 591–597, Baltimore, MD, USA, October 1996.
-
(1996)
Proc. Of the 19Th National Information Systems Security Conf
, pp. 591-597
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
-
9
-
-
4544373958
-
Understanding Code Mobility
-
May
-
A.F uggetta, G.P. Picco, and G. Vigna. Understanding Code Mobility. IEEE Transactions on Software Engineering, 24(5):342–361, May 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
, pp. 342-361
-
-
Uggetta, A.F.1
Picco, G.P.2
Vigna, G.3
-
10
-
-
0002992633
-
D’Agents: Security in a multiplelanguage, mobile-agent system
-
In G. Vigna, editor, Springer- Verlag
-
R.S. Gra y, D. Kotz, G. Cyb enko, and D. Rus. D’Agents: Security in a multiplelanguage, mobile-agent system. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, pages 154–187.Springer- Verlag, 1998.
-
(1998)
Mobile Agents and Security, Volume 1419 of Lecture Notes in Computer Science
, pp. 154-187
-
-
Gra Y, R.S.1
Kotz, D.2
Cyb Enko, G.3
Rus, D.4
-
11
-
-
0033689082
-
Supporting reconfigurable security policies for mobile programs
-
June
-
B. Hashii, S. Malabarba, R. Pandey, and M. Bishop. Supporting reconfigurable security policies for mobile programs. Computer Networks, 33(1-6):77–93, June 2000.
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 77-93
-
-
Hashii, B.1
Malabarba, S.2
Pandey, R.3
Bishop, M.4
-
12
-
-
0027668428
-
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
-
P aul Helman and Gunar Liepins. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. In IEEE Transactions on Software Engineering, volume Vol 19, No.9, pages 886–901, 1993.
-
(1993)
In IEEE Transactions on Software Engineering, Volume
, vol.19
, Issue.9
, pp. 886-901
-
-
Aul Helman, P.1
Liepins, G.2
-
13
-
-
85015336184
-
Intelligent Agents for Intrusion Detection
-
Syracuse, NY, September
-
G. Helmer, J.S.K. Wong, V. Honavar, and L. Miller. Intelligent Agents for Intrusion Detection. In Proceedings of the IEEE Information Technology Conference, pages 121–124, Syracuse, NY, September 1998.
-
(1998)
Proceedings of the IEEE Information Technology Conference
, pp. 121-124
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
-
14
-
-
0029267472
-
State Transition Analysis: A Rule- Based Intrusion Detection System
-
March
-
K. Ilgun, R.A. Kemmerer, and P.A. Porras. State Transition Analysis: A Rule- Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181–199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
16
-
-
0011066222
-
-
NIST, October
-
W. Jansen, P. Mell, T. Karygiannis, and D. Marks. Applying mobile agents to intrusion detection and response.T echnical Report 6416, NIST, October 1999.
-
(1999)
Applying Mobile Agents to Intrusion Detection and Response.T Echnical Report 6416
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
17
-
-
0004118981
-
The NIDES Statistical Component Description and Justification
-
Menlo Park, CA, March
-
H.S. Javitz and A. Valdes. The NIDES Statistical Component Description and Justification. Technical report, SRI International, Menlo Park, CA, March 1994.
-
(1994)
Technical Report, SRI International
-
-
Javitz, H.S.1
Valdes, A.2
-
18
-
-
3042776024
-
A Security Model for Aglets
-
G. Karjoth, D. Lange, and M. Oshima. A Security Model for Aglets. In G.Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS.Springer, 1998.
-
(1998)
G.Vigna, Editor, Mobile Agents and Security, Volume 1419 of Lncs.Springer
-
-
Karjoth, G.1
Lange, D.2
Oshima, M.3
-
21
-
-
84940110274
-
Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST)
-
Oakland, California, May
-
U. Lindqvist and P.A. Porras. Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146–161, Oakland, California, May 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
25
-
-
84986199479
-
Software Engineering for Mobility: A Roadmap
-
In A. Finkelstein, editor, A CM Press
-
Gruia-Catalin Roman, Gian Pietro Picco, and Amy L. Murphy. Software Engineering for Mobility: A Roadmap.In A. Finkelstein, editor, The Future of Software Engineering, pages 241–258.A CM Press, 2000.
-
(2000)
The Future of Software Engineering
, pp. 241-258
-
-
Roman, G.-C.1
Picco, G.P.2
Murphy, A.L.3
-
27
-
-
84944115210
-
-
Mountain View, CA 94043, December
-
Sun Microsystems, Inc. Installing, Administering, and Using the Basic Security Module.2550 Garcia Ave., Mountain View, CA 94043, December 1991.
-
(1991)
Inc. Installing, Administering, and Using the Basic Security Module.2550 Garcia Ave
-
-
Microsystems, S.1
-
28
-
-
84944115211
-
-
June
-
Tcp dump and Libpcap Documentation. http://www.tcpdump.org/, June 2002.
-
(2002)
-
-
-
29
-
-
84944039629
-
Active Monitoring of Network Systems using Mobile Agents
-
University of Minnesota, May
-
A. Tripathi, T. Ahmed, S. Pathak, A. Pathak, M. Carney, M. Koka, and P. Dokas. Active Monitoring of Network Systems using Mobile Agents. Technical report, Department of Computer Science, University of Minnesota, May 2002.
-
(2002)
Technical Report, Department of Computer Science
-
-
Tripathi, A.1
Ahmed, T.2
Pathak, S.3
Pathak, A.4
Carney, M.5
Koka, M.6
Dokas, P.7
-
30
-
-
0002717089
-
Cryptographic Traces for Mobile Agents
-
In G. Vigna, editor, Springer-Verlag, June
-
G. Vigna.Cryptographic Traces for Mobile Agents.In G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, June 1998.
-
(1998)
Mobile Agents and Security, Volume 1419 of LNCS
-
-
Vigna, G.1
-
31
-
-
84860434876
-
The STAT Tool Suite
-
Hilton Head, South Carolina, January 2000.IEEE Computer Society Press
-
G. Vigna, S. Eckmann, and R. Kemmerer. The STAT Tool Suite. In Proceedings of DISCEX 2000, Hilton Head, South Carolina, January 2000.IEEE Computer Society Press.
-
Proceedings of DISCEX 2000
-
-
Vigna, G.1
Eckmann, S.2
Kemmerer, R.3
-
32
-
-
0010518517
-
Attack Languages
-
Boston, MA, October
-
G. Vigna, S.T. Eckmann, and R.A. Kemmerer. Attack Languages. In Proceedings of the IEEE Information Survivability Workshop, Boston, MA, October 2000.
-
(2000)
Proceedings of the IEEE Information Survivability Workshop
-
-
Vigna, G.1
Eckmann, S.T.2
Kemmerer, R.A.3
-
33
-
-
84947584002
-
Designing a Web of Highly-Configurable Intrusion Detection Sensors
-
In W. Lee, L. Mé, and A. Wespi, editors, Davis, CA, October 2001. Springer-Verlag
-
G. Vigna, R.A. Kemmerer, and P. Blix. Designing a Web of Highly-Configurable Intrusion Detection Sensors. In W. Lee, L. Mé, and A. Wespi, editors, Proceedings of the 4th International Symposiun on Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 69–84, Davis, CA, October 2001. Springer-Verlag.
-
Th International Symposiun on Recent Advances in Intrusion Detection (RAID 2001), Volume 2212 of LNCS
, pp. 69-84
-
-
Vigna, G.1
Kemmerer, R.A.2
Blix, P.3
|