-
1
-
-
33751035185
-
A framework for the evaluation of intrusion detection systems
-
A. A. Cardenas, J. S. Baras, and K. Seamon, "A framework for the evaluation of intrusion detection systems," in IEEE Symposium on Security and Privacy, 2006, pp. 63-77.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 63-77
-
-
Cardenas, A.A.1
Baras, J.S.2
Seamon, K.3
-
3
-
-
84891302221
-
-
B. Foo, Y. sung Wu, Y. chun Mao, S. Bagchi, and E. H. Spafford, "Adepts: Adaptive intrusion response using attack graphs in an e-commerce environment, dsn," 2005.
-
(2005)
Adepts: Adaptive Intrusion Response Using Attack Graphs in An E-commerce Environment, Dsn
-
-
Foo, B.1
Sung Wu, Y.2
Chun Mao, Y.3
Bagchi, S.4
Spafford, E.H.5
-
4
-
-
34548776459
-
Taxonomy of intrusion response systems
-
N. Stakhanova, S. Basu, and J. Wong, "Taxonomy of intrusion response systems," International Journal of Information and Computer Security, vol. 1, pp. 169-184, 2007.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, pp. 169-184
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
6
-
-
4344567256
-
Owl web ontology language overview
-
D. McGuinness, F. Van Harmelen et al., "Owl web ontology language overview," W3C recommendation, vol. 10, no. 2004-03, p. 10, 2004.
-
(2004)
W3C Recommendation
, vol.10
, pp. 10
-
-
McGuinness, D.1
Van Harmelen, F.2
-
7
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
9
-
-
45749124706
-
-
Georgia Institute of Technology. GIT-CC-05-10, Tech. Rep.
-
G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skori, "An Information-Theoretic Measure of Intrusion Detection Capability," Georgia Institute of Technology. GIT-CC-05-10, Tech. Rep., 2005.
-
(2005)
An Information-Theoretic Measure of Intrusion Detection Capability
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skori, B.5
-
10
-
-
33750264822
-
-
Computer Security-ESORICS 2006
-
G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoric, "Towards an information-theoretic framework for analyzing intrusion detection systems," Computer Security-ESORICS 2006, pp. 527-546, 2006.
-
(2006)
Towards An Information-theoretic Framework for Analyzing Intrusion Detection Systems
, pp. 527-546
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
11
-
-
33746416682
-
A target-centric ontology for intrusion detection
-
J. Undercoffer, J. Pinkston, A. Joshi, and T. Finin, "A target-centric ontology for intrusion detection," in Workshop on Ontologies in Distributed Systems-18th International Joint Conference on Artificial Intelligence, 2004.
-
(2004)
Workshop on Ontologies in Distributed Systems-18th International Joint Conference on Artificial Intelligence
-
-
Undercoffer, J.1
Pinkston, J.2
Joshi, A.3
Finin, T.4
-
12
-
-
84864671603
-
An ontology-driven approach to model siem information and operations using the swrl formalism
-
Aug.
-
G. G. Granadillo, Y. B. Mustapha, N. Hachem, and H. Debar, "An ontology-driven approach to model siem information and operations using the swrl formalism," Int. J. Electron. Secur. Digit. Forensic, vol. 4, no. 2/3, pp. 104-123, Aug. 2012. [Online]. Available: http://dx.doi.org/10.1504/IJESDF.2012. 048412
-
(2012)
Int. J. Electron. Secur. Digit. Forensic
, vol.4
, Issue.2-3
, pp. 104-123
-
-
Granadillo, G.G.1
Mustapha, Y.B.2
Hachem, N.3
Debar, H.4
-
13
-
-
78649504015
-
An ontology-driven approach applied to information security
-
A. Vorobiev and N. Bekmamedova, "An Ontology-Driven Approach Applied to Information Security," Journal of Research and Practice in Information Technology, vol. 42, no. 1, pp. 61-76, 2010.
-
(2010)
Journal of Research and Practice in Information Technology
, vol.42
, Issue.1
, pp. 61-76
-
-
Vorobiev, A.1
Bekmamedova, N.2
-
14
-
-
33646699357
-
Security ontology for annotating resources
-
A. Kim, J. Luo, and M. Kang, "Security ontology for annotating resources," On the Move to Meaningful Internet Systems 2005, pp. 1483-1499, 2005.
-
(2005)
On the Move to Meaningful Internet Systems 2005
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
15
-
-
67349242974
-
A logicbased model to support alert correlation in intrusion detection
-
Feb.
-
B. Morin, L. Me, H. Debar, and M. Ducasse, "A logicbased model to support alert correlation in intrusion detection," Information Fusion, vol. 10, no. 4, pp. 285-299, Feb. 2009.
-
(2009)
Information Fusion
, vol.10
, Issue.4
, pp. 285-299
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducasse, M.4
-
17
-
-
84891281375
-
-
eEye Digital Security. ida Code Red Worm Tech. Rep
-
eEye Digital Security, ".ida Code Red Worm," Tech. Rep. [Online]. Available: http://www.eeye.com/html/ Research/Advisories/AL20010717. html
-
-
-
-
18
-
-
70349446395
-
-
Tech. Rep.
-
Cisco, "Introduction to Cisco IOS NetFlow," Tech. Rep., 2012. [Online]. Available: http://www.cisco.com/ en/US/prod/collateral/iosswrel/ ps6537/ps6555/ps6601/ prod\ white\ paper0900aecd80406232.html
-
(2012)
Introduction to Cisco IOS NetFlow
-
-
|