-
1
-
-
84900594778
-
New TCP scan method
-
ANTIREZ. 18 December
-
ANTIREZ. new tcp scan method. Posted to the bugtraq mailing list, 18 December 1998.
-
(1998)
Posted to the Bugtraq Mailing List
-
-
-
2
-
-
0141762463
-
A technique lor counting NATted hosts
-
New York, NY, USA, ACM
-
BELLOVIN, S. M . A technique lor counting NATted hosts. In 1MW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment (New York, NY, USA, 2002), ACM, pp. 267-272.
-
(2002)
1MW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment
, pp. 267-272
-
-
Bellovin, S.M.1
-
3
-
-
0037917924
-
A n overview of SAL
-
A N D Hampton, VA, jun C. M. Holloway, Ed., NASA Langiey Research Center
-
BENSALEM, S., GANESH, V., LAKHNECH, Y, NOZ, C . M ., OWRE, S., RUESS, H ., RUSHBY, J., RUSU, V., SAIDI, H ., SHANKAR, N ., SINGERMAN, E., A N D TIWARI, A . A n overview of SAL. In LFM 2000: Fifth NASA Langiey Formal Methods Workshop (Hampton, VA, jun 2000), C. M. Holloway, Ed., NASA Langiey Research Center, pp. 187-196.
-
(2000)
LFM 2000: Fifth NASA Langiey Formal Methods Workshop
, pp. 187-196
-
-
Bensalem, S.1
Ganesh, V.2
Lakhnech, Y.3
Noz, C.M.4
Owre, S.5
Ruess, H.6
Rushby, J.7
Rusu, V.8
Saidi, H.9
Shankar, N.10
Singerman, E.11
Tiwari, A.12
-
5
-
-
34247101917
-
From NuSMV to spin: Experiences with model checking (light guidance systems
-
CHOI, Y. From NuSMV to SPIN: Experiences with model checking (light guidance systems. Form. Methods Syst. Des. 30, 3 (2007), 199-216.
-
(2007)
Form. Methods Syst. Des.
, vol.30
, Issue.3
, pp. 199-216
-
-
Choi, Y.1
-
6
-
-
85076286396
-
-
note, Computer Science Laboratory, SRI International, Menlo Park, CA, Apr
-
DEMOURA, E. SAL tutorial. CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Apr. 2004. Available at http://sal.csl.sri.com/doc/salenv_tutorial.pdf.
-
(2004)
SAL Tutorial. CSL Technical
-
-
Demoura, E.1
-
7
-
-
0016543936
-
Guarded commands, nondeterminacy and formal derivation of programs
-
DIJKSTRA, E. W. Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM 18, 8 (1975), 453¬ 457.
-
(1975)
Commun. ACM
, vol.18
, Issue.8
, pp. 453-457
-
-
Dijkstra, E.W.1
-
8
-
-
21244481937
-
State/event-based software model checking
-
8 A N D Springer-Verlag
-
[ 8 ] EDMUND, S . C, CLARKE, E . M ., SHARYGINA, N ., A N D SINHA, N . State/event-based software model checking. I n Integrated Formal Methods (2004), Springer-Verlag, pp. 128-147.
-
(2004)
I N Integrated Formal Methods
, pp. 128-147
-
-
Edmund, S.C.1
Clarke, E.M.2
Sharygina, N.3
Sinha, N.4
-
9
-
-
69349097375
-
-
PhD thesis, Dalhousie Univ., Halifax, Canada, Canada
-
GATES, C. Co-ordinatedpon scans: a model, a detector and an evaluation methodology. PhD thesis, Dalhousie Univ., Halifax, Canada, Canada, 2006.
-
(2006)
Co-Ordinatedpon Scans: A Model, A Detector and An Evaluation Methodology
-
-
Gates, C.1
-
12
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
AND Washington, DC, USA, 2 0 0 4), IEEE Computer Society
-
Gu, G., SHARIF, M ., QIN, X ., DAGON, D ., LEE, W ., A N D RILEY, G. Worm detection, early warning and response based on local victim information. In ACSAC '04: Proceedings of the 20th Annual Computer Security Applications Conference (Washington, DC, USA, 2 0 0 4), IEEE Computer Society, pp. 136-145.
-
ACSAC '04: Proceedings of the 20th Annual Computer Security Applications Conference
, pp. 136-145
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
13
-
-
33744518446
-
Modeling and verification of IPSec and VPN security policies
-
AND Washington, DC, USA, IEEE Computer Society
-
HAMED, H ., AL-SHAER, E., A N D MARRERO, W. Modeling and verification of IPSec and VPN security policies. In ICNP '05: Proceedings of the 1JTH IEEE International Conference on Network Protocols (Washington, DC, USA, 2005), IEEE Computer Society, pp. 259-278.
-
(2005)
ICNP '05: Proceedings of the 1JTH IEEE International Conference on Network Protocols
, pp. 259-278
-
-
Hamed, H.1
Al-Shaer, E.2
Marrero, W.3
-
14
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
JUNG, J., PAXSON, V, BERGER, A . W., A N D BALAKRISH-NAN, H. Fast portscan detection using sequential hypothesis testing. In Proceedings of the IEEE Symposium on Security and Privacy (2004).
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrish-Nan, H.4
-
15
-
-
37849009761
-
Distributed evasive scan techniques and countermeasures
-
AND Berlin, Heidelberg, Springer-Verlag
-
KANG, M . G., CABALLERO, J., A N D SONG, D . Distributed evasive scan techniques and countermeasures. In DIMVA '07: Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Berlin, Heidelberg, 2007), Springer-Verlag, pp. 157-174.
-
(2007)
DIMVA '07: Proceedings of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 157-174
-
-
Kang, M.G.1
Caballero, J.2
Song, D.3
-
16
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
KEMMERER, R. A. Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans. Compia. Syst. 1, 3 (1983), 256-277.
-
(1983)
ACM Trans. Compia. Syst.
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
20
-
-
70350218435
-
NMAP network scanning: The official NMAP project guide to network discover,: The security scanning
-
20 Org LLC, Sunnyvale, CA, USA
-
LYON, G . Nmap Network Scanning: The Official Nmap Project Guide to Network Discover,- and Security Scanning. Insecure.Org L L C, Sunnyvale, CA, USA, 2009.
-
(2009)
Insecure
-
-
Lyon, G.1
-
21
-
-
36448929074
-
A simulation-based proof technique for dynamic information low
-
AND San Diego, California, USA, June 14
-
MCCAMANT, S., A N D ERNST, M . D. A simulation-based proof technique for dynamic information (low. In PLAS 2007: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (San Diego, California, USA, June 14, 2007) .
-
(2007)
PLAS 2007: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
-
-
McCamant, S.1
Ernst, M.D.2
-
22
-
-
67650065318
-
Quantitative information (low as network (low capacity
-
AND Tucson, A Z, USA, June 9-11
-
MCCAMANT, S., A N D ERNST, M . D . Quantitative information (low as network (low capacity. In Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation (Tucson, A Z, USA, June 9-11, 2008) .
-
(2008)
Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation
-
-
McCamant, S.1
Ernst, M.D.2
-
23
-
-
33645223621
-
Interactive visualization for network and port scan detection
-
MUELDER, C, LIU, M.A.K ., A N D BARTOLETTI, T. Interactive visualization for network and port scan detection. In Proceedings of2005 Recent Advances in Intrusion Detection (2005), p. 05 .
-
(2005)
Proceedings Of2005 Recent Advances in Intrusion Detection
, pp. 05
-
-
Muelder, C.1
Liu, M.A.K.2
Bartoletti, T.3
-
24
-
-
14944369649
-
Characteristics o f internet background radiation
-
AND New York, NY, USA, ACM
-
PANG, R., YEGNESWARAN, V, BARFORD, P., PAXSON, V ., A N D PETERSON, L . Characteristics o f internet background radiation. In IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement (New York, NY, USA, 2004), ACM, pp. 27^0.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 27-28
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
25
-
-
0033718255
-
R Using model checking to analyze network vulnerabilities
-
Washington, DC, USA, IEEE Computer Society
-
RITCHEY, R. W., A N D AMMANN, R Using model checking to analyze network vulnerabilities. In SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2000), IEEE Computer Society, p. 156.
-
(2000)
SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 156
-
-
Ritchey, R.W.1
Ammann, A.N.D.2
-
26
-
-
33750100723
-
-
CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Oct
-
RUSHBY, J. SAL tutorial: The Needham-Schroeder protocol in SAL. CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Oct. 2003. Available at http://www.csl.sri.com/users/rushby/abstracts/needham03.
-
(2003)
SAL Tutorial: The Needham-Schroeder Protocol in SAL
-
-
Rushby, J.1
-
27
-
-
77954584130
-
-
CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Apr
-
RUSHBY, J. SAL tutorial: Analyzing the fault-tolerant algorithm OM(l). CSL technical note, Computer Science Laboratory, SRI International, Menlo Park, CA, Apr. 2004. Available at http://www.csl.sri.com/users/rushby/abstracts/oml.
-
(2004)
SAL Tutorial: Analyzing the Fault-Tolerant Algorithm OM(L)
-
-
Rushby, J.1
-
28
-
-
85076319788
-
-
SAL PROJECT. Examples, http://sal.csl.sri.com/examples. shtml.
-
Examples
-
-
-
29
-
-
26844466732
-
Fast detection ot scanning worm infections
-
AND French Riviera, France, September
-
SCHECHTER, S., JUNG, J., A N D BERGER, A . W. Fast Detection ot Scanning Worm Infections. In 7lh International Symposium on Recent Advances in Intrusion Detection (RAID) (French Riviera, France, September 2004).
-
(2004)
7lh International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Schechter, S.1
Jung, J.2
Berger, A.W.3
-
30
-
-
77954322607
-
Tracking port scanners on the IP backbone
-
AND New York, NY, USA, A C M
-
SRIDHARAN, A ., A N D YE, T. Tracking port scanners on the IP backbone. In LSAD '07: Proceedings of the 2007 workshop on Large Scale Attack Defense (New York, NY, USA, 2007), A C M, pp. 137-144.
-
(2007)
LSAD '07: Proceedings of the 2007 Workshop on Large Scale Attack Defense
, pp. 137-144
-
-
Sridharan, A.1
Ye, T.2
-
31
-
-
33751053025
-
Connectionless port scan detection on the backbone
-
AND April
-
SRIDHARAN, A ., YE, T., A N D BHATTACHARYYA, S. Connectionless port scan detection on the backbone. In Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International (April 2006), pp. 10 pp.-576.
-
(2006)
Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International
, pp. 555-576
-
-
Sridharan, A.1
Ye, T.2
Bhattacharyya, S.3
-
32
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
STANIFORD, S., HOAGLAND, J.A ., A N D MCALERNEY, J . M . Practical automated detection of stealthy portscans. /. Compiti Secar. 10, 1-2 (2002), 105-136.
-
(2002)
Compiti Secar
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
34
-
-
84872740465
-
-
VirtualBox. http://www.virtualbox.org/.
-
VirtualBox
-
-
-
35
-
-
85084164480
-
Very
-
AND Berkeley, CA, USA, USENIX Association
-
WEAVER, N ., STANIFORD, S., A N D PAXSON, V. Very fast containment of scanning worms. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium (Berkeley, CA, USA, 2004), USENIX Association, pp. 3-3.
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 3
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
36
-
-
85068681376
-
DNSbased detection of scanning worms in an enterprise network
-
WHYTE, D., KRANAKIS, E., A N D VAN OORSCHOT, P. C. DNSbased detection of scanning worms in an enterprise network. In Proc. ofthe 12th annual Network and Distributed System Security symposium (2005), pp. 181-195.
-
(2005)
Proc. Ofthe 12th Annual Network and Distributed System Security Symposium
, pp. 181-195
-
-
Whyte, D.1
Kranakis, E.2
Van Oorschot, P.C.3
|