-
2
-
-
80052169144
-
Advanced persistent threats and how to monitor and deter them
-
C. Tankard, "Advanced persistent threats and how to monitor and deter them." Network Security, vol. 2011, no. 8, pp. 16-19, 2011.
-
(2011)
Network Security
, vol.2011
, Issue.8
, pp. 16-19
-
-
Tankard, C.1
-
3
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
M. E. Karim, A. Walenstein, A. Lakhotia, and L. Parida, "Malware phylogeny generation using permutations of code." J. in Comp. Virology, vol. 1, no. 1-2, pp. 13-23, 2005.
-
(2005)
J. in Comp. Virology
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Karim, M.E.1
Walenstein, A.2
Lakhotia, A.3
Parida, L.4
-
6
-
-
84879333627
-
Lariat: Lincoln adaptable real-time information assurance testbed
-
L. M. Rossey, R. K. Cunningham, D. J. Fried, J. C. Rabek, R. P. Lippmann, J. W. Haines, and M. A. Zissman, "Lariat: Lincoln adaptable real-time information assurance testbed," in In IEEE Proc. Aerospace Conference, 2001, pp. 2671-2682.
-
(2001)
IEEE Proc. Aerospace Conference
, pp. 2671-2682
-
-
Rossey, L.M.1
Cunningham, R.K.2
Fried, D.J.3
Rabek, J.C.4
Lippmann, R.P.5
Haines, J.W.6
Zissman, M.A.7
-
7
-
-
33745678278
-
Virtual playgrounds for worm behavior investigation
-
Springer
-
X. Jiang, D. Xu, H. J. Wang, and E. H. Spafford, "Virtual playgrounds for worm behavior investigation." in RAID, vol. 3858. Springer, 2005, pp. 1-21.
-
(2005)
RAID
, vol.3858
, pp. 1-21
-
-
Jiang, X.1
Xu, D.2
Wang, H.J.3
Spafford, E.H.4
-
8
-
-
4544290790
-
A testbed for quantitative assessment of intrusion detection systems using fuzzy logic
-
G. Singaraju, L. Teo, and Y. Zheng, "A testbed for quantitative assessment of intrusion detection systems using fuzzy logic," in IEEE Int'l Inf. Assurance Workshop, 2004.
-
(2004)
IEEE Int'l Inf. Assurance Workshop
-
-
Singaraju, G.1
Teo, L.2
Zheng, Y.3
-
9
-
-
84855701737
-
The science of cyber security experimentation: The deter project
-
T. Benzel, "The science of cyber security experimentation: The deter project." in ACSAC. ACM, 2011, pp. 137-148.
-
(2011)
ACSAC. ACM
, pp. 137-148
-
-
Benzel, T.1
-
10
-
-
84899454533
-
A testbed for scada control system cybersecurity research and pedagogy
-
T. Morris, R. Vaughn, and Y. S. Dandass, "A testbed for scada control system cybersecurity research and pedagogy," in Workshop on Cyber Security and Information Intelligence Research, 2011, pp. 27:1-27:1.
-
(2011)
Workshop on Cyber Security and Information Intelligence Research
, pp. 271-271
-
-
Morris, T.1
Vaughn, R.2
Dandass, Y.S.3
-
11
-
-
84908283968
-
Intrusion detection in distributed systems using fingerprinting and massive event correlation
-
F. Skopik and R. Fiedler, "Intrusion detection in distributed systems using fingerprinting and massive event correlation," in 43. Jahrestagung der Gesellschaft fuer Informatik e.V., 2013, pp. 2240-2254.
-
(2013)
43. Jahrestagung der Gesellschaft fuer Informatik E.V.
, pp. 2240-2254
-
-
Skopik, F.1
Fiedler, R.2
-
12
-
-
84864700045
-
-
McGraw-Hill
-
D. R. Miller, S. Harris, A. Harper, S. VanDyke, and C. Blask, Security Information and Event Management (SIEM) Imple-mentation. McGraw-Hill, 2010.
-
(2010)
Security Information and Event Management (SIEM) Imple-mentation
-
-
Miller, D.R.1
Harris, S.2
Harper, A.3
Vandyke, S.4
Blask, C.5
-
13
-
-
84910090109
-
-
DARPA Intrusion Detection Data Sets
-
DARPA Intrusion Detection Data Sets, http://www.ll.mit. edu/mission/communications/cyber/CSTcorpora/ideval/data/, 2000.
-
(2000)
-
-
|