-
1
-
-
0037228072
-
The law, cybercrime, risk assessment and cyber protection
-
Stephen Hinde. The law, cybercrime, risk assessment and cyber protection. Computers & Security, pages 90-95, 2003.
-
(2003)
Computers & Security
, pp. 90-95
-
-
Hinde, S.1
-
2
-
-
84872054085
-
-
Available at
-
Public Safety Canada. Canada's Cyber Security Strategy, 2009. Available at: http://www.publicsafety.gc.ca/prg/ns/cbr/-fl/ccss-scc-eng.pdf.
-
(2009)
Canada's Cyber Security Strategy
-
-
-
3
-
-
85084163190
-
A virtual honeypot framework
-
SSYM'04, Berkeley, CA, USA, USENIX Association
-
Niels Provos. A virtual honeypot framework. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 1-1, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 1
-
-
Provos, N.1
-
5
-
-
85081770459
-
The Internet motion sensor: A distributed blackhole monitoring system
-
San Diego, CA, February
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson. The Internet motion sensor: A distributed blackhole monitoring system. In Proceedings of Network and Distributed System Security Symposium (NDSS'05), pages 1-13, San Diego, CA, February 2005.
-
(2005)
Proceedings of Network and Distributed System Security Symposium (NDSS'05)
, pp. 1-13
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
7
-
-
14944369649
-
Characteristics of internet background radiation
-
New York, NY, USA, ACM
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, IMC '04, pages 27-40, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, IMC '04
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
8
-
-
78650939601
-
Internet background radiation revisited
-
New York, NY, USA, ACM
-
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff Huston. Internet background radiation revisited. In Proceedings of the 10th annual conference on Internet measurement, IMC '10, pages 62-74, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement, IMC '10
, pp. 62-74
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Huston, G.5
-
10
-
-
0742276097
-
Inside the slammer worm
-
July-August
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. Security Privacy, IEEE, 1(4):33-39, July-August 2003.
-
(2003)
Security Privacy, IEEE
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
11
-
-
33745205813
-
Inferring internet denial-of-service activity
-
May
-
David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, and Stefan Savage. Inferring internet denial-of-service activity. ACM Transactions on Computer Systems, 24:115-139, May 2006.
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
12
-
-
42149134786
-
A brief history of scanning
-
New York, NY, USA, ACM
-
Mark Allman, Vern Paxson, and Jeff Terrell. A brief history of scanning. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, IMC '07, pages 77-82, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC '07
, pp. 77-82
-
-
Allman, M.1
Paxson, V.2
Terrell, J.3
-
13
-
-
67249104170
-
Correlation among piecewise unwanted traffic time series
-
December
-
K. Fukuda, T. Hirotsu, O. Akashi, and T. Sugawara. Correlation among piecewise unwanted traffic time series. In Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, pages 1 -5, December 2008.
-
(2008)
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE
, pp. 1-5
-
-
Fukuda, K.1
Hirotsu, T.2
Akashi, O.3
Sugawara, T.4
-
14
-
-
78650939601
-
Internet background radiation revisited
-
New York, NY, USA, ACM
-
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff Huston. Internet background radiation revisited. In Proceedings of the 10th annual conference on Internet measurement, IMC '10, pages 62-74, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement, IMC '10
, pp. 62-74
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Huston, G.5
-
15
-
-
33750013256
-
Denial of service attacks targeting a SIP VoIP infrastructure: Attack scenarios and prevention mechanisms
-
September-October
-
D. Sisalem, J. Kuthan, and S. Ehlert. Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. Network, IEEE, 20(5):26-31, September-October 2006.
-
(2006)
Network, IEEE
, vol.20
, Issue.5
, pp. 26-31
-
-
Sisalem, D.1
Kuthan, J.2
Ehlert, S.3
-
17
-
-
84872088691
-
-
Microsoft Security TechCenter. Available at
-
Microsoft Security TechCenter. Microsoft security bulletin ms09-018 - critical. Available at: http://technet.microsoft.com/en-us/security/bulletin/ MS09-018.
-
Microsoft Security Bulletin Ms09-018 - Critical
-
-
-
18
-
-
84872073027
-
-
Available at
-
Saumil Shah. Top ten web attacks. Available at: http://www.blackhat.com/ presentations/bh-asia-02/bh-asia-02-shah.pdf .
-
Top Ten Web Attacks
-
-
Shah, S.1
-
19
-
-
84872091793
-
-
Learn Security Online. Available at
-
Learn Security Online. MS terminal service cracking. Available at: http://www.carnal0wnage.com/papers/lso-ms-terminal-server-cracking.pdf.
-
MS Terminal Service Cracking
-
-
-
20
-
-
84872067597
-
-
Available at
-
Snort. Available at: http://www.snort.org.
-
-
-
-
21
-
-
84870952509
-
-
last accessed on December 2011
-
The bro network security monitor. http://bro-ids.org/, last accessed on December 2011.
-
The Bro Network Security Monitor
-
-
-
23
-
-
84872072404
-
-
National Institute of Standards and Technology (NIST)-National Cyber-Alert System. Available at
-
National Institute of Standards and Technology (NIST)-National Cyber-Alert System. Vulnerability summary for cve-2007-2931, 2011. Available at: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-2931.
-
(2011)
Vulnerability Summary for Cve-2007-2931
-
-
-
24
-
-
84872055674
-
-
Available at
-
Sourcefire-Snort, 2011. Available at: http://www.snort.org/search/sid/ 587.
-
(2011)
Sourcefire-Snort
-
-
-
25
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
June
-
R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. ACM SIGMOD Record, 22(2):207-216, June 1993.
-
(1993)
ACM SIGMOD Record
, vol.22
, Issue.2
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
26
-
-
0003372359
-
Mining frequent patterns by pattern-growth: Methodology and implications
-
December
-
J. Han and J. Pei. Mining frequent patterns by pattern-growth: methodology and implications. ACM SIGKDD Explorations Newsletter, pages 14-20, December 2000.
-
(2000)
ACM SIGKDD Explorations Newsletter
, pp. 14-20
-
-
Han, J.1
Pei, J.2
-
28
-
-
0033279583
-
Efficient mining of association rules in text databases
-
Kansas City, Missouri, United States
-
John D. Holt and Soon M. Chung. Efficient mining of association rules in text databases. In Proc. of the 8th ACM International Conference on Information and Knowledge Management (CIKM), pages 234-242, Kansas City, Missouri, United States, 1999.
-
(1999)
Proc. of the 8th ACM International Conference on Information and Knowledge Management (CIKM)
, pp. 234-242
-
-
Holt, J.D.1
Chung, S.M.2
|