-
2
-
-
84863446969
-
Detecting targeted malicious email
-
Rohan Amin, Julie Ryan, Johan van Dorp, Detecting targeted malicious email, Security & Privacy, IEEE 10 (3) (2012) 64-71.
-
(2012)
Security & Privacy IEEE
, vol.10
, Issue.3
, pp. 64-71
-
-
Amin, R.1
Ryan, J.2
Van Dorp, J.3
-
3
-
-
43449117487
-
Context based application level intrusion detection system, in: International conference on Networking and Services 2006
-
A. Anitha, V. Vaidehi, Context based application level intrusion detection system, in: International conference on Networking and Services, 2006, ICNS'06, IEEE, 2006, p. 16.
-
(2006)
ICNS'06 IEEE
, pp. 16
-
-
Anitha, A.1
Vaidehi, V.2
-
4
-
-
84871986666
-
Defending against web application vulnerabilities
-
Nuno Antunes, Marco Vieira, Defending against web application vulnerabilities, Computer (2012) 66-72.
-
Computer
, vol.2012
, pp. 66-72
-
-
Antunes, N.1
Vieira, M.2
-
5
-
-
84862174649
-
Towards an ontological approach to information system security and safety requirement modeling and reuse
-
O.T. Arogundade, A.T. Akinwale, Z. Jin, X.G. Yang, Towards an ontological approach to information system security and safety requirement modeling and reuse, Information Security Journal: A Global Perspective 21 (3) (2012) 137-149.
-
(2012)
Information Security Journal: A Global Perspective
, vol.21
, Issue.3
, pp. 137-149
-
-
Arogundade, O.T.1
Akinwale, A.T.2
Jin, Z.3
Yang, X.G.4
-
6
-
-
78651230573
-
Anomaly detection using negative security model in web application, in: 2010 international conference on computer information systems and industrial management applications (cisim)
-
M. Auxilia, D. Tamilselvan, Anomaly detection using negative security model in web application, in: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE, 2010, pp. 481-486.
-
(2010)
IEEE
, pp. 481-486
-
-
Auxilia, M.1
Tamilselvan, D.2
-
7
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
Sep 2008, IEEE 2008
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, G. Vigna, Saner: composing static and dynamic analysis to validate sanitization in web applications, in: IEEE Symposium on Security and Privacy, 2008, SP 2008, IEEE, 2008, pp. 387-401.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
8
-
-
0017547820
-
A fast string searching algorithm
-
R.S. Boyer, J.S. Moore, A fast string searching algorithm, Communications of the ACM 20 (10) (1977) 762-772.
-
(1977)
Communications of the ACM
, vol.20
, Issue.10
, pp. 762-772
-
-
Boyer, R.S.1
Moore, J.S.2
-
9
-
-
33646465922
-
Getting to the core of the matter, Strength
-
T.D. Brown, Getting to the core of the matter, Strength & Conditioning Journal 28 (2) (2006) 50.
-
(2006)
Conditioning Journal
, vol.28
, Issue.2
, pp. 50
-
-
Brown, T.D.1
-
12
-
-
84941152376
-
Jena: Implementing the semantic web recommendations, in: Implementing
-
Jeremy J Carroll, Ian Dickinson, Chris Dollin, Dave Reynolds, Andy Seaborne, Kevin Wilkinson, Jena: implementing the semantic web recommendations, in: Proceedings of the 13th international World Wide Web Conference on Alternate Track Papers & Posters, ACM, 2004, pp. 74-83.
-
(2004)
Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers & Posters ACM
, pp. 74-83
-
-
Carroll, J.J.1
Dickinson, I.2
Dollin, C.3
Reynolds, D.4
Seaborne, A.5
Wilkinson, K.6
-
13
-
-
84863381941
-
Detecting anomalous insiders in collaborative information systems
-
You Chen, Steve Nyemba, Bradley Malin, Detecting anomalous insiders in collaborative information systems, IEEE Transactions on Dependable and Secure Computing 9 (3) (2012) 332-344.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 332-344
-
-
Chen, Y.1
Nyemba, S.2
Malin, B.3
-
14
-
-
33847315579
-
Reflection in membership equational logic, many-sorted equational logic, Horn logic with equality, and rewriting logic
-
DOI 10.1016/j.tcs.2006.12.009, PII S0304397506008991
-
Manuel Clavel, José Meseguer, Miguel Palomino, Reflection in membership equational logic, many-sorted equational logic, horn logic with equality, and rewriting logic, Theoretical Computer Science 373 (2007) 70-91. (Pubitemid 46330566)
-
(2007)
Theoretical Computer Science
, vol.373
, Issue.1-2
, pp. 70-91
-
-
Clavel, M.1
Meseguer, J.2
Palomino, M.3
-
15
-
-
84870052907
-
-
Web Semantics: Science, Services and Agents on the World Wide Web
-
Michael Compton, Payam Barnaghi, Luis Bermudez, Raul Garcia-Castro, Oscar Corcho, Simon Cox, John Graybeal, Manfred Hauswirth, Cory Henson, Arthur Herzog, et al., The SSN ontology of the w3c semantic sensor network incubator group, Web Semantics: Science, Services and Agents on the World Wide Web, 2012.
-
(2012)
The SSN Ontology of the w3c Semantic Sensor Network Incubator Group
-
-
Compton, M.1
Barnaghi, P.2
Bermudez, L.3
Garcia-Castro, R.4
Corcho, O.5
Cox, S.6
Graybeal, J.7
Hauswirth, M.8
Henson, C.9
Herzog, A.10
-
16
-
-
0242371001
-
Security for daml web services: Annotation and matchmaking
-
G. Denker, L. Kagal, T. Finin, M. Paolucci, K. Sycara, Security for daml web services: Annotation and matchmaking, The Semantic Web-ISWC 2003 (2003) 335-350.
-
(2003)
The Semantic Web-ISWC 2003
, pp. 335-350
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
Paolucci, M.4
Sycara, K.5
-
18
-
-
84863407389
-
Detecting spam zombies by monitoring outgoing messages
-
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stephenson, JamesMichael Barker, Detecting spam zombies by monitoring outgoing messages, IEEE Transactions on Dependable and Secure Computing 9 (2) (2012) 198-210.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.2
, pp. 198-210
-
-
Duan, Z.1
Chen, P.2
Sanchez, F.3
Dong, Y.4
Stephenson, M.5
Barker, J.6
-
19
-
-
0038394738
-
-
D. Eastlake, J. Reagle, D. Solo, M. Bartel, J. Boyer, B. Fox, B. LaMacchia, E. Simon, Xml-Signature Syntax and Processing, 2002.
-
(2002)
Xml-Signature Syntax and Processing
-
-
Eastlake, D.1
Reagle, J.2
Solo, D.3
Bartel, M.4
Boyer, J.5
Fox, B.6
Lamacchia, B.7
Simon, E.8
-
20
-
-
77953883563
-
-
IEEE
-
M. Ektefa, S. Memar, F. Sidi, L.S. Affendey, Intrusion detection using data mining techniques, in: 2010 International Conference on Information Retrieval & Knowledge Management, (CAMP), IEEE, 2010, pp. 200-203.
-
(2010)
Intrusion Detection Using Data Mining Techniques In: 2010 International Conference on Information Retrieval & Knowledge Management, (CAMP)
, pp. 200-203
-
-
Ektefa, M.1
Memar, S.2
Sidi, F.3
Affendey, L.S.4
-
21
-
-
84887254864
-
A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis
-
Nan Feng, Harry Jiannan Wang, Minqiang Li, A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis, Information Sciences (2013).
-
(2013)
Information Sciences
-
-
Feng, N.1
Jiannan Wang, H.2
Li, M.3
-
22
-
-
50049109224
-
Information security fortification by ontological mapping of the iso/iec 27001 standard, in: 13th Pacific Rim International Symposium on
-
S. Fenz, G. Goluch, A. Ekelhart, B. Riedl, E. Weippl, Information security fortification by ontological mapping of the iso/iec 27001 standard, in: 13th Pacific Rim International Symposium on Dependable Computing, 2007, PRDC 2007, IEEE, 2007, pp. 381-388.
-
(2007)
Dependable Computing 2007 PRDC 2007 IEEE
, pp. 381-388
-
-
Fenz, S.1
Goluch, G.2
Ekelhart, A.3
Riedl, B.4
Weippl, E.5
-
23
-
-
0003415244
-
-
Roy Fielding, Jim Gettys, Jeffrey Mogul, Henrik Frystyk, Larry Masinter, Paul Leach, Tim Berners-Lee, Hypertext transfer protocol-http/1.1, 1999.
-
(1999)
Hypertext Transfer protocol-http/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
24
-
-
51449121189
-
Building a test suite for web application scanners
-
E. Fong, R. Gaucher, V. Okun, P.E. Black, Building a test suite for web application scanners, in: Proceedings of the 41st Annual Hawaii International Conference on System Sciences, IEEE, 2008. pp. 478-478.
-
(2008)
Proceedings of the 41st Annual Hawaii International Conference on System Sciences IEEE
, pp. 478-478
-
-
Fong, E.1
Gaucher, R.2
Okun, V.3
Black, P.E.4
-
25
-
-
85030414074
-
-
Marc Fossi, Gerry Egan, Kevin Haley, Eric Johnson, Trevor Mack, Téo Adams, Joseph Blackbird, Mo King Low, Debbie Mazurek, David McKinney, et al., Symantec Internet Security Threat Report Trends for 2010, vol. 16(20), 2011.
-
(2011)
Symantec Internet Security Threat Report Trends for 2010
, vol.16
, Issue.20
-
-
Fossi, M.1
Egan, G.2
Haley, K.3
Johnson, E.4
Mack, T.5
Adams, T.6
Blackbird, J.7
King Low, M.8
Mazurek, D.9
McKinney, D.10
-
26
-
-
84858811097
-
Analysis and identification of malicious javascript code
-
Mohammad Fraiwan, Rami Al-Salman, Natheer Khasawneh, Stefan Conrad, Analysis and identification of malicious javascript code, Information Security Journal: A Global Perspective 21 (1) (2012) 1-11.
-
(2012)
Information Security Journal: A Global Perspective
, vol.21
, Issue.1
, pp. 1-11
-
-
Fraiwan, M.1
Al-Salman, R.2
Khasawneh, N.3
Conrad, S.4
-
27
-
-
84858381543
-
Internet access traffic measurement and analysis
-
Steffen Gebert, Rastin Pries, Daniel Schlosser, Klaus Heck, Internet access traffic measurement and analysis, in: Traffic Monitoring and Analysis, Springer, 2012, pp. 29-42.
-
(2012)
Traffic Monitoring and Analysis Springer
, pp. 29-42
-
-
Gebert, S.1
Pries, R.2
Schlosser, D.3
Heck, K.4
-
28
-
-
38949103680
-
Combating the insider cyber threat
-
DOI 10.1109/MSP.2008.8
-
F.L. Greitzer, A.P. Moore, D.M. Cappelli, D.H. Andrews, L.A. Carroll, T.D. Hull, Combating the insider cyber threat, Security & Privacy IEEE 6 (1) (2008) 61-64. (Pubitemid 351229834)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.1
, pp. 61-64
-
-
Greitzer, F.L.1
Moore, A.P.2
Cappelli, D.M.3
Andrews, D.H.4
Carroll, L.A.5
Hull, T.D.6
-
30
-
-
0012257635
-
Evaluating ontological decisions with ontoclean
-
Nicola Guarino, Christopher Welty, Evaluating ontological decisions with ontoclean, Communications of the ACM 45 (2) (2002) 61-65. (Pubitemid 135699725)
-
(2002)
Communications of the ACM
, vol.45
, Issue.2
, pp. 61-65
-
-
Guarino, N.1
Welty, C.2
-
31
-
-
84855928597
-
Identity theft and financial fraud: Some strangeness in the proportions
-
Hal Berghel, Identity theft and financial fraud: Some strangeness in the proportions, Computer 45 (1) (2012) 86-89.
-
(2012)
Computer
, vol.45
, Issue.1
, pp. 86-89
-
-
Berghel, H.1
-
32
-
-
0031190959
-
Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
-
B. Guha, B. Mukherjee, Network security via reverse engineering of tcp code: vulnerability analysis and proposed solutions, Network, IEEE 11 (4) (1997) 40-48. (Pubitemid 127603071)
-
(1997)
IEEE Network
, vol.11
, Issue.4
, pp. 40-48
-
-
Guha, B.1
Mukherjee, B.2
-
33
-
-
79952065811
-
An ontology of information security
-
Ethical, and Human Issues
-
A. Herzog, N. Shahmehri, C. Duma, An ontology of information security, Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (2009) 278-301.
-
(2009)
Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational
, pp. 278-301
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
34
-
-
0001875510
-
Daml + oil: Adescription logic for the semantic web
-
I. Horrocks et al, Daml + oil: adescription logic for the semantic web, IEEE Data Engineering Bulletin 25 (1) (2002) 4-9.
-
(2002)
IEEE Data Engineering Bulletin
, vol.25
, Issue.1
, pp. 4-9
-
-
Horrocks Et Al, I.1
-
35
-
-
17644419220
-
Swrl: A semantic web rule language combining owl and ruleml
-
Ian Horrocks, Peter F Patel-Schneider, Harold Boley, Said Tabet, Benjamin Grosof, Mike Dean, et al., Swrl: a semantic web rule language combining owl and ruleml, W3C Member Submission 21 (2004) 79.
-
(2004)
W3C Member Submission
, vol.21
, pp. 79
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
36
-
-
84858632756
-
Detecting and resolving firewall policy anomalies
-
Hongxin Hu, Gail-Joon Ahn, Ketan. Kulkarni, Detecting and resolving firewall policy anomalies, IEEE Transactions on Dependable and Secure Computing 9 (3) (2012) 318-331.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 318-331
-
-
Hu, H.1
Ahn, G.2
Kulkarni, K.3
-
39
-
-
77957112438
-
Static analysis for detecting taint-style vulnerabilities in web applications
-
N. Jovanovic, C. Kruegel, E. Kirda, Static analysis for detecting taint-style vulnerabilities in web applications, Journal of Computer Security 18 (5) (2010) 861-907.
-
(2010)
Journal of Computer Security
, vol.18
, Issue.5
, pp. 861-907
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
40
-
-
85030414073
-
-
USENIX Association
-
J. Kannan, P. Maniatis, B.G. Chun, Secure data preservers for web services, in: Proceedings of the 2nd USENIX Conference on Web Application Development, USENIX Association, 2011, pp. 3-3.
-
(2011)
Secure Data Preservers for Web Services, In: Proceedings of the 2nd USENIX Conference on Web Application Development
, pp. 3-3
-
-
Kannan, J.1
Maniatis, P.2
Chun, B.G.3
-
41
-
-
4344697279
-
Resource description framework (RDF): Concepts and abstract syntax
-
Graham Klyne, Jeremy J Carroll, Brian McBride, Resource description framework (RDF): concepts and abstract syntax, W3C Recommendation 10 (2004).
-
(2004)
W3C Recommendation
, vol.10
-
-
Klyne, G.1
Carroll, J.J.2
McBride, B.3
-
42
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
C. Krugel, T. Toth, E. Kirda, Service specific anomaly detection for network intrusion detection, in: Proceedings of the 2002 ACM symposium on Applied computing, ACM, 2002, pp. 201-208. (Pubitemid 35009592)
-
(2002)
Proceedings of the ACM Symposium on Applied Computing
, pp. 201-208
-
-
Krugel, C.1
Toth, T.2
Kirda, E.3
-
43
-
-
0028514027
-
A taxonomy of computer program security flaws
-
C.E. Landwehr, A.R. Bull, J.P. McDermott, W.S. Choi, A taxonomy of computer program security flaws, ACM Computing Surveys (CSUR) 26 (3) (1994) 211-254.
-
(1994)
ACM Computing Surveys (CSUR
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
44
-
-
84859400554
-
Identifying web spam with the wisdom of the crowds
-
Yiqun Liu, Fei Chen, Weize Kong, Huijia Yu, Min Zhang, Shaoping Ma, Liyun Ru, Identifying web spam with the wisdom of the crowds, ACM Transactions on the Web (TWEB) 6 (1) (2012) 2.
-
(2012)
ACM Transactions on the Web (TWEB
, vol.6
, Issue.1
, pp. 2
-
-
Liu, Y.1
Chen, F.2
Kong, W.3
Yu, H.4
Zhang, M.5
Ma, S.6
Ru, L.7
-
45
-
-
25144491719
-
NetGlean: A methodology for distributed network security scanning
-
DOI 10.1007/s10922-005-6263-2
-
G.W. Manes, D. Schulte, S. Guenther, S. Shenoi, Netglean: a methodology for distributed network security scanning, Journal of Network and Systems Management 13 (3) (2005) 329-344. (Pubitemid 41344140)
-
(2005)
Journal of Network and Systems Management
, vol.13
, Issue.3
, pp. 329-344
-
-
Manes, G.W.1
Schulte, D.2
Guenther, S.3
Shenoi, S.4
-
46
-
-
4344567256
-
Owl web ontology language overview
-
2004-03
-
Deborah L McGuinness, Frank Van Harmelen, et al, Owl web ontology language overview, W3C Recommendation 10 (2004-03) (2004) 10.
-
(2004)
W3C Recommendation
, vol.10
, pp. 10
-
-
McGuinness, D.L.1
Van Harmelen, F.2
-
47
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, ACM Transactions on Information and System Security 3 (4) (2000) 262-294.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
48
-
-
84883386223
-
Abstraction-based intrusion detection in distributed environments
-
P. Ning, S. Jajodia, X.S. Wang, Abstraction-based intrusion detection in distributed environments, ACM Transactions on Information and System Security (TISSEC) 4 (4) (2001) 407-452.
-
(2001)
ACM Transactions on Information and System Security (TISSEC
, vol.4
, Issue.4
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
51
-
-
84860436315
-
Using rule ontology in repeated rule acquisition from similar web sites
-
Sangun Park, Juyoung Kang, Using rule ontology in repeated rule acquisition from similar web sites, IEEE Transactions on Knowledge and Data Engineering 24 (6) (2012) 1106-1119.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering 24
, vol.6
, pp. 1106-1119
-
-
Park, S.1
Kang, J.2
-
52
-
-
84871665774
-
Idmas-sql: Intrusion detection based on mas to detect and block sql injection through data mining
-
Cristian I Pinzon, Juan F De Paz, Alvaro Herrero, Emilio Corchado, Javier Bajo, Juan M Corchado, idmas-sql: Intrusion detection based on mas to detect and block sql injection through data mining, Information Sciences (2011).
-
(2011)
Information Sciences
-
-
Pinzon, C.I.1
Paz De, J.F.2
Herrero, A.3
Corchado, E.4
Bajo, J.5
Corchado, J.M.6
-
55
-
-
0242456149
-
Ontology in information security: A useful theoretical foundation and methodological tool
-
V. Raskin, C.F. Hempelmann, K.E. Triezenberg, S. Nirenburg, Ontology in information security: a useful theoretical foundation and methodological tool, in: Proceedings of the 2001 Workshop on New Security Paradigms, ACM, 2001, pp. 53-59.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms ACM
, pp. 53-59
-
-
Raskin, V.1
Hempelmann, C.F.2
Triezenberg, K.E.3
Nirenburg, S.4
-
56
-
-
79955734165
-
-
10th International Symposium on Autonomous Decentralized Systems (ISADS) IEEE
-
A. Razzaq, A. Hur, M. Masood, K. Latif, H.F. Ahmad, H. Takahashi, Foundation of semantic rule engine to protect web application attacks, in: 2011, 10th International Symposium on Autonomous Decentralized Systems (ISADS), IEEE, 2011, pp. 95-102.
-
(2011)
Foundation of Semantic Rule Engine to Protect Web Application Attacks 2011
, pp. 95-102
-
-
Razzaq, A.1
Hur, A.2
Masood, M.3
Latif, K.4
Ahmad, H.F.5
Takahashi, H.6
-
58
-
-
34248401104
-
Application layer intrusion detection for SQL injection
-
DOI 10.1145/1185448.1185564, Proceedings of the 44th ACM Southeast Conference, ACMSE 2006
-
F.S. Rietta, Application layer intrusion detection for sql injection, in: Proceedings of the 44th Annual Southeast Regional Conference, ACM, 2006, pp. 531-536. (Pubitemid 46733524)
-
(2006)
Proceedings of the Annual Southeast Conference
, vol.2006
, pp. 531-536
-
-
Rietta, F.S.1
-
60
-
-
85090433665
-
-
Seattle, Washington
-
M. Roesch, et al., Snort-lightweight intrusion detection for networks, in: Proceedings of the 13th USENIX conference on System administration, Seattle, Washington, 1999, pp. 229-238.
-
(1999)
Snort-lightweight Intrusion Detection for Networks, In: Proceedings of the 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
61
-
-
84886363601
-
Community analysis through semantic rules and role composition derivation
-
Matthew Rowe, Miriam Fernandez, Sofia Angeletou, Harith Alani, Community analysis through semantic rules and role composition derivation, Web Semantics: Science, Services and Agents on the World Wide Web, 2012.
-
(2012)
Web Semantics: Science, Services and Agents on the World Wide Web
-
-
Rowe, M.1
Fernandez, M.2
Angeletou, S.3
Alani, H.4
-
62
-
-
84859165019
-
Knowledge discovery through ontology matching: An approach based on an artificial neural network model
-
M. Rubiolo, M.L. Caliusco, G. Stegmayer, M. Coronel, M. Gareli Fabrizi, Knowledge discovery through ontology matching: an approach based on an artificial neural network model, Information Sciences 194 (2012) 107-119.
-
(2012)
Information Sciences
, vol.194
, pp. 107-119
-
-
Rubiolo, M.1
Caliusco, M.L.2
Stegmayer, G.3
Coronel, M.4
Gareli Fabrizi, M.5
-
63
-
-
0142071646
-
Integrated access control and intrusion detection for web servers
-
T. Ryutov, C. Neuman, K. Dongho, Z. Li, Integrated access control and intrusion detection for web servers, IEEE Transactions on Parallel and Distributed Systems 14 (9) (2003) 841-850.
-
(2003)
IEEE Transactions on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 841-850
-
-
Ryutov, T.1
Neuman, C.2
Dongho, K.3
Li, Z.4
-
64
-
-
84861726546
-
Opcode sequences as representation of executables for data-mining-based unknown malware detection
-
Igor Santos, Felix Brezo, Xabier Ugarte-Pedrero, Pablo G Bringas, Opcode sequences as representation of executables for data-mining-based unknown malware detection, Information Sciences (2011).
-
(2011)
Information Sciences
-
-
Santos, I.1
Brezo, F.2
Ugarte-Pedrero, X.3
Bringas, P.G.4
-
65
-
-
81855221782
-
Enhanced topic-based vector space model for semantics-Aware spam filtering
-
Igor Santos, Carlos Laorden, Borja Sanz, Pablo G Bringas, Enhanced topic-based vector space model for semantics-Aware spam filtering, Expert Systems with applications 39 (1) (2012) 437-444.
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.1
, pp. 437-444
-
-
Santos, I.1
Laorden, C.2
Sanz, B.3
Bringas, P.G.4
-
66
-
-
17444432965
-
Hierarchical Kohonenen Net for anomaly detection in network security
-
DOI 10.1109/TSMCB.2005.843274
-
S.T. Sarasamma, Q.A. Zhu, J. Huff, Hierarchical kohonenen net for anomaly detection in network security, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 35 (2) (2005) 302-312. (Pubitemid 40535913)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
67
-
-
84886364499
-
In-execution dynamic malware analysis and detection by mining information in process control blocks of linux os
-
Farrukh Shahzad, M. Shahzad, Muddassar Farooq, In-execution dynamic malware analysis and detection by mining information in process control blocks of linux os, Information Sciences (2011).
-
(2011)
Information Sciences
-
-
Shahzad, F.1
Shahzad, M.2
Farooq, M.3
-
68
-
-
84858250036
-
Hee Beng Kuan Tan Defending against cross-site scripting attacks
-
Lwin Khin Shar, Hee Beng Kuan Tan, Defending against cross-site scripting attacks, Computer 45 (3) (2012) 55-62.
-
(2012)
Computer
, vol.45
, Issue.3
, pp. 55-62
-
-
Khin Shar, L.1
-
69
-
-
84889086576
-
Behavior modeling and automated verification of web services
-
Quan Z Sheng, Zakaria Maamarb, Lina Yaoa, Claudia Szaboa, Scott Bournea, Behavior modeling and automated verification of web services, Information Sciences (2012).
-
(2012)
Information Sciences
-
-
Sheng, Q.Z.1
Maamarb, Z.2
Yaoa, L.3
Szaboa, C.4
Bournea, S.5
-
70
-
-
34249817069
-
Pellet: A practical OWL-DL reasoner
-
DOI 10.1016/j.websem.2007.03.004, PII S1570826807000169, Software Engineering and the Semantic Web
-
Evren Sirin, Bijan Parsia, Bernardo Cuenca Grau, Aditya Kalyanpur, Yarden Katz, Pellet: A practical owl-dl reasoner, Web Semantics: Science, Services and Agents on the World Wide Web 5 (2) (2007) 51-53. (Pubitemid 46856283)
-
(2007)
Web Semantics
, vol.5
, Issue.2
, pp. 51-53
-
-
Sirin, E.1
Parsia, B.2
Grau, B.C.3
Kalyanpur, A.4
Katz, Y.5
-
73
-
-
84863343959
-
Opass: A user authentication protocol resistant to password stealing and password reuse attacks
-
Hung-Min Sun, Yao-Hsin Chen, Yue-Hsun Lin, opass: A user authentication protocol resistant to password stealing and password reuse attacks, IEEE Transactions on Information Forensics and Security 7 (2) (2012) 651-663.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 651-663
-
-
Sun, H.1
Chen, Y.2
Lin, Y.3
-
74
-
-
85030410594
-
-
C.Y. Tan, S.R. Tan, B. Morel, 19601 Information Warfare, in: 19601 Information Warfare, Carnegie Mellon, 2011, pp. 15.
-
(2011)
19601 Information Warfare, In: 19601 Information Warfare, Carnegie Mellon
, pp. 15
-
-
Tan, C.Y.1
Tan, S.R.2
Morel, B.3
-
75
-
-
33746416682
-
A target-centric ontology for intrusion detection
-
J. Undercoffer, J. Pinkston, A. Joshi, T. Finin, A target-centric ontology for intrusion detection, in: 18th International Joint Conference on Artificial Intelligence, 2004, pp. 9-15.
-
(2004)
18th International Joint Conference on Artificial Intelligence
, pp. 9-15
-
-
Undercoffer, J.1
Pinkston, J.2
Joshi, A.3
Finin, T.4
-
76
-
-
84863623874
-
Integrating trust management and access control in data-intensive web applications
-
Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Giuseppe Psaila, Pierangela Samarati, Integrating trust management and access control in data-intensive web applications, ACM Transactions on the Web (TWEB) 6 (2) (2012) 6.
-
(2012)
ACM Transactions on the Web (TWEB
, vol.6
, Issue.2
, pp. 6
-
-
De Capitani Di, V.S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Psaila, G.5
Samarati, P.6
-
77
-
-
84861603441
-
Ranking semantic relationships between two entities using personalization in context specification
-
V. Viswanathan, Ilango Krishnamurthi, Ranking semantic relationships between two entities using personalization in context specification, Information Sciences (2012).
-
(2012)
Information Sciences
-
-
Viswanathan, V.1
Krishnamurthi, I.2
-
78
-
-
85030412779
-
Internet Information Services (IIS) 7.0 resource kit
-
Mike Volordarsky, Olga M Londer, Brett Hill, Bernard Cheah, Steve Schofield, Carlos Aguiar Mares, Kurt Meyer, et al, Internet Information Services (IIS) 7.0 resource kit, Microsoft Press, 2010.
-
(2010)
Microsoft Press
-
-
Volordarsky, M.1
Londer, O.M.2
Hill, B.3
Cheah, B.4
Schofield, S.5
Aguiar Mares, C.6
Meyer, K.7
-
79
-
-
80054909543
-
Considerations regarding the security and protection of e-banking services consumers' interests
-
M. Vrancianu, L.A. Popa, Considerations regarding the security and protection of e-banking services consumers' interests, The Amfiteatru Economic Journal 12 (28) (2010) 388-403.
-
(2010)
The Amfiteatru Economic Journal 12
, vol.28
, pp. 388-403
-
-
Vrancianu, M.1
Popa, L.A.2
-
80
-
-
84886365152
-
Data mining methods for anomaly detection of http request exploitations
-
X.F. Wang, J.L. Zhou, S.S. Yu, L.Z. Cai, Data mining methods for anomaly detection of http request exploitations, Fuzzy Systems and Knowledge Discovery (2005) 484. 484.
-
(2005)
Fuzzy Systems and Knowledge Discovery
, vol.484
, pp. 484
-
-
Wang, X.F.1
Zhou, J.L.2
Yu, S.S.3
Cai, L.Z.4
-
81
-
-
84861136278
-
Automated security test generation with formal threat models
-
Dianxiang Xu, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, Weifeng Xu, Automated security test generation with formal threat models, IEEE Transactions on Dependable and Secure Computing 9 (4) (2012) 526-540.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.4
, pp. 526-540
-
-
Xu, D.1
Tu, M.2
Sanford, M.3
Thomas, L.4
Woodraska, D.5
Xu, W.6
-
82
-
-
84863895638
-
Anomaly detection using proximity graph and pagerank algorithm
-
Zhe Yao, Philip Mark, Michael Rabbat, Anomaly detection using proximity graph and pagerank algorithm, IEEE Transactions on Information Forensics and Security 7 (4) (2012) 1288-1300.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.4
, pp. 1288-1300
-
-
Yao, Z.1
Mark, P.2
Rabbat, M.3
|