-
2
-
-
49049102759
-
Using security patterns to combine security metrics
-
T. Heyman, R. Scandariato, C. Huygens, and W. Joosen, "Using security patterns to combine security metrics," in Proceedings of 2008 International Conference on Availability, Reliability and Security, pp. 1156-1163
-
Proceedings of 2008 International Conference on Availability, Reliability and Security
, pp. 1156-1163
-
-
Heyman, T.1
Scandariato, R.2
Huygens, C.3
Joosen, W.4
-
4
-
-
84866660191
-
-
University of Stockholm, Technical Report
-
R. Barabanov, S. Kowalski, and L. Yngström, "Information Security Metrics: Research Directions," University of Stockholm, Technical Report, 2011
-
(2011)
Information Security Metrics: Research Directions
-
-
Barabanov, R.1
Kowalski, S.2
Yngström, L.3
-
7
-
-
84870349845
-
-
Oak Ridge National Laboratory, Technical Report ORNL/TM-2010/30, February 2010
-
R. A. Kisner, W. W. Manges, L. P. MacIntyre, J. J. Nutaro, J. K. Munro, P. D. Ewing, M. Howlander, P. T. Kuruganti, R. M. Wallace, and M. M. Olama, "Cybersecurity through Real-Time Distributed Control Systems," Oak Ridge National Laboratory, Technical Report ORNL/TM-2010/30, February 2010
-
Cybersecurity Through Real-Time Distributed Control Systems
-
-
Kisner, R.A.1
Manges, W.W.2
Macintyre, L.P.3
Nutaro, J.J.4
Munro, J.K.5
Ewing, P.D.6
Howlander, M.7
Kuruganti, P.T.8
Wallace, R.M.9
Olama, M.M.10
-
8
-
-
78049469768
-
-
Sandia National Laboratories, Sandia Report SAND2007-2070P, September
-
A. McIntyre, B. Becker, and R. Halbgewachs, "Security Metrics for Process Control Systems," Sandia National Laboratories, Sandia Report SAND2007-2070P, September 2007
-
(2007)
Security Metrics for Process Control Systems
-
-
McIntyre, A.1
Becker, B.2
Halbgewachs, R.3
-
9
-
-
84880562472
-
-
Sandia National Laboratories, Sandia Report SAND2012-2427, March
-
M. Mateski, C. M. Trevino, C. K. Veitch, J. Michalski, J. M. Harris, S. Maruoka, and J. Frye, "Cyber Threat Metrics," Sandia National Laboratories, Sandia Report SAND2012-2427, March 2012
-
(2012)
Cyber Threat Metrics
-
-
Mateski, M.1
Trevino, C.M.2
Veitch, C.K.3
Michalski, J.4
Harris, J.M.5
Maruoka, S.6
Frye, J.7
-
14
-
-
84884488380
-
-
The Center for Internet Security, Technical Report, version 1. 1. 0, November 1
-
"The CIS Security Metrics," The Center for Internet Security, Technical Report, version 1. 1. 0, November 1 2010
-
(2010)
The CIS Security Metrics
-
-
-
17
-
-
84912540517
-
-
http://rules. emergingthreats. net/fwrules/emerging-Block-IPs. txt
-
-
-
-
18
-
-
84875589665
-
Measurement artifacts in netflow data
-
R. Hofstede, I. Drago, A. Sperotto, R. Sadre, and A. Pras, "Measurement Artifacts in NetFlow Data," in Proceedings of the 2013 Passive and Active Measurement Conference, pp. 1-10
-
Proceedings of the 2013 Passive and Active Measurement Conference
, pp. 1-10
-
-
Hofstede, R.1
Drago, I.2
Sperotto, A.3
Sadre, R.4
Pras, A.5
-
19
-
-
79952950177
-
Peeling away timing error in netflow data
-
B. Trammell, B. Tellenbach, D. Schatzmann, and M. Burkhardt, "Peeling Away Timing Error in NetFlow Data," in Proceedings of the 2011 Passive and Active Measurement Conference, pp. 194-203
-
Proceedings of the 2011 Passive and Active Measurement Conference
, pp. 194-203
-
-
Trammell, B.1
Tellenbach, B.2
Schatzmann, D.3
Burkhardt, M.4
-
20
-
-
84879763845
-
Detecting anomalous network traffic in organizational private networks
-
R. Vaarandi, "Detecting Anomalous Network Traffic in Organizational Private Networks," in Proceedings of the 2013 IEEE CogSIMA Conference, pp. 285-292
-
Proceedings of the 2013 IEEE CogSIMA Conference
, pp. 285-292
-
-
Vaarandi, R.1
-
22
-
-
49749121468
-
Simple Event Correlator for real-time security log monitoring
-
1/2006
-
R. Vaarandi, "Simple Event Correlator for real-time security log monitoring," Hakin9 Magazine, vol. 1/2006 (6), pp. 28-39, 2006
-
(2006)
Hakin9 Magazine
, Issue.6
, pp. 28-39
-
-
Vaarandi, R.1
-
24
-
-
84912530417
-
Security event processing with simple event correlator
-
R. Vaarandi and M. R. Grimaila, "Security Event Processing with Simple Event Correlator," Information Systems Security Association Journal, vol. 10(8), pp. 30-37, 2012
-
(2012)
Information Systems Security Association Journal
, vol.10
, Issue.8
, pp. 30-37
-
-
Vaarandi, R.1
Grimaila, M.R.2
-
25
-
-
84912540512
-
-
http://nxlog. org
-
-
-
-
26
-
-
84912540511
-
-
http://www. balabit. com/network-security/syslog-ng
-
-
-
-
27
-
-
84912540510
-
-
http://graphite. readthedocs. org
-
-
-
-
28
-
-
84912540509
-
-
http://nfsen. sourceforge. net
-
-
-
-
29
-
-
84912540508
-
-
http://www. elasticsearch. org
-
-
-
-
30
-
-
84912540507
-
-
http://www. elasticsearch. org/overview/kibana/
-
-
-
-
31
-
-
84912540506
-
-
http://www. rsyslog. com
-
-
-
-
32
-
-
84912540505
-
-
http://logstash. net
-
-
-
|