-
1
-
-
84896849643
-
Applications of data mining in computer security
-
Noel, S., Wijesekera, D. and Youman, C., Applications of data mining in computer security, Kluwer Academic Publishers. (2002), 3-25.
-
(2002)
Kluwer Academic Publishers
, pp. 3-25
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
3
-
-
79951793502
-
Hybrid pattern matching for trusted intrusion detection
-
Soewito, B., Vespa, L., Weng, N. and Wang, H., Hybrid pattern matching for trusted intrusion detection, Security and Communication Network. 4(2011), 33-43.
-
(2011)
Security and Communication Network
, vol.4
, pp. 33-43
-
-
Soewito, B.1
Vespa, L.2
Weng, N.3
Wang, H.4
-
7
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Kruegel, C., Mutz, D., Robertson, W. and Valeur, F., Bayesian event classification for intrusion detection, Proceedings of 19th Annual Computer Security Applications Conference (ACSAC). (2003) 14-23.
-
(2003)
Proceedings of 19th Annual Computer Security Applications Conference (ACSAC)
, pp. 14-23
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
10
-
-
84896842617
-
-
r0ut3r, GoodTech SSH Server SFTP Multiple Command, Handling Overflow
-
r0ut3r, GoodTech SSH Server SFTP Multiple Command, Handling Overflow, http://www.milw0rm.com/exploits/6804, 2008.
-
(2008)
-
-
-
11
-
-
84896869677
-
-
50 ways to defeat your intrusion detection system
-
Cohen, F., 50 ways to defeat your intrusion detection system. 1997. http://all.net/journal/netsec/1997-12.html.
-
(1997)
-
-
Cohen, F.1
-
12
-
-
84896852444
-
-
CAPEC(Common Attack Pattern Enumeration and Classification). MITRE cooperation
-
CAPEC(Common Attack Pattern Enumeration and Classification). MITRE cooperation. http://capec.mitre.org.
-
-
-
-
13
-
-
84896850183
-
-
CWE (Common Weakness Enumeration) MITRE cooperation
-
CWE (Common Weakness Enumeration). http://cwe.mitre.org. MITRE cooperation.
-
-
-
-
14
-
-
84896818265
-
-
CVE (Common Vulnerability Exposure) MITRE cooperation
-
CVE (Common Vulnerability Exposure). http://cve.mitre.org. MITRE cooperation.
-
-
-
-
15
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
Wang, L., Noel, S. and Jajodia, S., Minimum-cost network hardening using attack graphs, Computer Communications. 29 (2006) 3812-3824.
-
(2006)
Computer Communications
, vol.29
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
-
16
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
Jajodia, S., Noel, S. and O'Berry, B., Topological analysis of network attack vulnerability, Massive Computing. 5 (2005) 247-266.
-
(2005)
Massive Computing
, vol.5
, pp. 247-266
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
18
-
-
84896859825
-
Tool based formal Modeling, Analysis and Visualization of Enterprise Network Vulnerabilities utilising Attack Graph Exploration
-
Rieke, R., Tool based formal Modeling, Analysis and Visualization of Enterprise Network Vulnerabilities utilising Attack Graph Exploration, European Institute for Computer Antivirus Research (EICAR). 2004.
-
(2004)
European Institute for Computer Antivirus Research (EICAR)
-
-
Rieke, R.1
-
20
-
-
84896896004
-
A comparison of Case-based Reasoning and Neural Network Model for Intrusion Detection
-
Joo, D., Hong, T., Lee, S. and Han, I., A comparison of Case-based Reasoning and Neural Network Model for Intrusion Detection, Computer and Security. (2003).
-
(2003)
Computer and Security
-
-
Joo, D.1
Hong, T.2
Lee, S.3
Han, I.4
-
21
-
-
70349443411
-
DSS for computer security incident response applying CBR and collaborative response
-
Huy K. K., Kwang H. I. and Sang C. P., DSS for computer security incident response applying CBR and collaborative response, Expert Systems with Applications. 37 (2010) 852-870.
-
(2010)
Expert Systems with Applications
, vol.37
, pp. 852-870
-
-
Huy, K.K.1
Kwang, H.I.2
Sang, C.P.3
-
22
-
-
84950419860
-
Advances in record linking methodology as applied to the 1985 census of Tampa Florida
-
Jaro, M. E., Advances in record linking methodology as applied to the 1985 census of Tampa Florida, Journal of the American Statistical Society. 84 (1989) 414-420.
-
(1989)
Journal of the American Statistical Society
, vol.84
, pp. 414-420
-
-
Jaro, M.E.1
-
23
-
-
0012866045
-
The state of record linkage and current research problems, Statistics of Income Division
-
R99/04
-
Winkler, W. E., The state of record linkage and current research problems, Statistics of Income Division, Internal Revenue Service Publication. R99/04 (1999).
-
(1999)
Internal Revenue Service Publication
-
-
Winkler, W.E.1
-
24
-
-
0019887799
-
Identification of Common Molecular Subsequences
-
Smith, T. F. and Waterman, M. S., Identification of Common Molecular Subsequences, Journal of Molecular Biology. 147 (1981) 195-197.
-
(1981)
Journal of Molecular Biology
, vol.147
, pp. 195-197
-
-
Smith, T.F.1
Waterman, M.S.2
-
25
-
-
11144240583
-
A Comparison of String Distance Metrics for Name-Matching Tasks
-
Cohen, W., Ravikumar, P. and Fienberg, S. E., A Comparison of String Distance Metrics for Name-Matching Tasks, KDD Workshop on Data Cleaning and Object Consolidation. (2003) 73-78.
-
(2003)
KDD Workshop on Data Cleaning and Object Consolidation
, pp. 73-78
-
-
Cohen, W.1
Ravikumar, P.2
Fienberg, S.E.3
-
26
-
-
84887931518
-
The Economic Value of Online Game Developers in Early Stages
-
Changsok Y., Huy K. K., Eunnyeong H., The Economic Value of Online Game Developers in Early Stages, Journal of Future Game Technology. 1, 1(2011) 21-34.
-
(2011)
Journal of Future Game Technology
, vol.1
, Issue.1
, pp. 21-34
-
-
Changsok, Y.1
Huy, K.K.2
Eunnyeong, H.3
-
28
-
-
84896842600
-
Smartcard-based Remote User Authentication Protocol with Improved Security
-
Dae-Sik Park, Smartcard-based Remote User Authentication Protocol with Improved Security, Journal of The Korea Knowledge Information Technology Society, 6, 4(2011)27-34
-
(2011)
Journal of The Korea Knowledge Information Technology Society
, vol.6
, Issue.4
, pp. 27-34
-
-
Park, D.-S.1
-
29
-
-
84896835507
-
Classification Criteria and Application Methodology for Evaluating IT Security Products
-
Ki-Seok Bang, Classification Criteria and Application Methodology for Evaluating IT Security Products, Journal of The Korea Knowledge Information Technology Society, 6, 5(2011)105-112
-
(2011)
Journal of The Korea Knowledge Information Technology Society
, vol.6
, Issue.5
, pp. 105-112
-
-
Bang, K.-S.1
|