-
4
-
-
67649650450
-
Analysis Techniques For Detecting Coordinated Attacks and Probes
-
Santa Clara, California, USA, April 9-12, available at
-
Green et al. 1999] John Green, David Marchette, Stephen Northcutt, Bill Ralph, "Analysis Techniques for Detecting Coordinated Attacks and Probes", in Proc. 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, April 9-12, 1999, available at:http://www.usenix.org/publications/library/proceedings/detection99/full_papers/green/green_html/
-
(1999)
Proc. 1st USENIX Workshop On Intrusion Detection and Network Monitoring
-
-
Green, J.1
Marchette, D.2
Northcutt, S.3
Ralph, B.4
-
5
-
-
0028994247
-
Software Rejuvenation: Analysis, Module and Applications
-
Pasadena, CA, USA, June
-
Huang et al. 1995] Y. Huang, C. Kintala, N. Kolettis, N.D. Fulton, "Software Rejuvenation: Analysis, Module and Applications", in Proc. 25th IEEE Symposium on Fault Tolerant Computing Conference (FTCS-25), Pasadena, CA, USA, June 1995, pp. 381-390.
-
(1995)
Proc. 25th IEEE Symposium On Fault Tolerant Computing Conference (FTCS-25
, pp. 381-390
-
-
Huang, Y.1
Kintala, C.2
Kolettis, N.3
Fulton, N.D.4
-
6
-
-
0027808377
-
Interposition Agents: Transparently Interposing User Code at the System Interface
-
Jones 1993], December
-
Jones 1993] M. Jones, "Interposition Agents: Transparently Interposing User Code at the System Interface", Proc. 14th ACM Symp. on Operating Systems Principles, Operating Systems Review, 275, December 1993, pp. 80-93.
-
(1993)
Proc. 14th ACM Symp. On Operating Systems Principles, Operating Systems Review
, vol.275
, pp. 80-93
-
-
Jones, M.1
-
7
-
-
0042958768
-
-
Kim & Spafford 1993], Computer Science Dept, Purdue University
-
Kim & Spafford 1993] G.H. Kim and E.H. Spafford, The Design and Implementation of Tripwire: a File System Integrity Checker, Technical Report CSD-TR-93-071, Computer Science Dept, Purdue University, 1993.
-
(1993)
The Design and Implementation of Tripwire: A File System Integrity Checker, Technical Report CSD-TR-93-071
-
-
Kim, G.H.1
Spafford, E.H.2
-
8
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Lamport 1981], November
-
Lamport 1981] Leslie Lamport, "Password Authentication with Insecure Communication", Comunications of the ACM, 24 (11), pp. 770-772, November 1981.
-
(1981)
Comunications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
9
-
-
84902482921
-
-
Serafim & Weber 2002], The SOFFIC Project
-
Serafim & Weber 2002] Vinícius da Silveira Serafim and Raul Fernando Weber, The SOFFIC Project, http://www.inf.ufrgs.br/~gseg/projetos/the_soffic_project.pdf.
-
-
-
da Silveira, S.V.1
Weber, R.F.2
-
10
-
-
31344455537
-
An Adaptative Intrusion-Tolerant Server Architecture
-
Cambridge (UK), April, to appear in Springer LNCS Series
-
Valdes et al. 2002] A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J. Levy, H. Saïdi, V. Stavridou and T. Uribe, "An Adaptative Intrusion-Tolerant Server Architecture", in Proc. 10th International Workshop on Security Protocols, Cambridge (UK), April 2002, to appear in Springer LNCS Series.
-
(2002)
Proc. 10th International Workshop On Security Protocols
-
-
Valdes, A.1
Almgren, M.2
Cheung, S.3
Deswarte, Y.4
Dutertre, B.5
Levy, J.6
Saïdi, H.7
Stavridou, V.8
Uribe, T.9
|