-
1
-
-
79551507966
-
Cyber attacks: awareness
-
E. G. Amoroso, "Cyber attacks: awareness," Network Security, vol. 2011, pp. 10-16, 2011.
-
(2011)
Network Security
, vol.2011
, pp. 10-16
-
-
Amoroso, E.G.1
-
2
-
-
77955582072
-
The challenge of cyber attack deterrence
-
G. Kenneth, "The challenge of cyber attack deterrence," Computer Law & Security Review, vol. 26, pp. 298-303, 2010.
-
(2010)
Computer Law & Security Review
, vol.26
, pp. 298-303
-
-
Kenneth, G.1
-
3
-
-
79951553312
-
The dark side of the Internet: Attacks, costs and responses
-
W. Kim, O.-R. Jeong, C. Kim, and J. So, "The dark side of the Internet: Attacks, costs and responses," Information Systems, vol. 36, pp. 675-705, 2011.
-
(2011)
Information Systems
, vol.36
, pp. 675-705
-
-
Kim, W.1
Jeong, O.-R.2
Kim, C.3
So, J.4
-
4
-
-
77957932944
-
Cyber Weapons Convention
-
G. Kenneth, "Cyber Weapons Convention," Computer Law & Security Review, vol. 26, pp. 547-551, 2010.
-
(2010)
Computer Law & Security Review
, vol.26
, pp. 547-551
-
-
Kenneth, G.1
-
5
-
-
53049102892
-
Building network attack graph for alert causal correlation
-
S. Zhang, J. Li, X. Chen, and L. Fan, "Building network attack graph for alert causal correlation," Computers & Security, vol. 27, pp. 188-196, 2008.
-
(2008)
Computers & Security
, vol.27
, pp. 188-196
-
-
Zhang, S.1
Li, J.2
Chen, X.3
Fan, L.4
-
6
-
-
84863389870
-
Generation and Analysis of Attack Graphs
-
C. Wang, N. Du, and H. Yang, "Generation and Analysis of Attack Graphs," Procedia Engineering, vol. 29, pp. 4053-4057, 2012.
-
(2012)
Procedia Engineering
, vol.29
, pp. 4053-4057
-
-
Wang, C.1
Du, N.2
Yang, H.3
-
7
-
-
80955142736
-
Analysis of update delays in signature-based network intrusion detection systems
-
H. Gascon, A. Orfila, and J. Blasco, "Analysis of update delays in signature-based network intrusion detection systems," vol. 30, pp. 613-624, 2011.
-
(2011)
, vol.30
, pp. 613-624
-
-
Gascon, H.1
Orfila, A.2
Blasco, J.3
-
8
-
-
84857364659
-
Performance of automated network vulnerability scanning at remediating security issues
-
H. Holm, "Performance of automated network vulnerability scanning at remediating security issues," Computers & Security, vol. 31, pp. 164-175, 2012.
-
(2012)
Computers & Security
, vol.31
, pp. 164-175
-
-
Holm, H.1
-
9
-
-
84868351615
-
Cracking Associative Passwords
-
A. Jøsang and B. Carlsson, Eds., ed: Springer Berlin Heidelberg
-
K. Helkala, N. Svendsen, P. Thorsheim, and A. Wiehe, "Cracking Associative Passwords," in Secure IT Systems. vol. 7617, A. Jøsang and B. Carlsson, Eds., ed: Springer Berlin Heidelberg, 2012, pp. 153-168.
-
(2012)
Secure IT Systems
, vol.7617
, pp. 153-168
-
-
Helkala, K.1
Svendsen, N.2
Thorsheim, P.3
Wiehe, A.4
-
10
-
-
61849175333
-
Efficient deterministic method for detecting new U2R attacks
-
R. Beghdad, "Efficient deterministic method for detecting new U2R attacks," Computer Communications, vol. 32, pp. 1104-1110, 2009.
-
(2009)
Computer Communications
, vol.32
, pp. 1104-1110
-
-
Beghdad, R.1
-
11
-
-
84875223281
-
Botnets: A survey
-
S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, "Botnets: A survey," COMPUTER NETWORKS, vol. 57, pp. 378-403, 2013.
-
(2013)
COMPUTER NETWORKS
, vol.57
, pp. 378-403
-
-
Silva, S.S.C.1
Silva, R.M.P.2
Pinto, R.C.G.3
Salles, R.M.4
-
12
-
-
84861312719
-
Procedure for detection of and response to Distributed Denial of Service cyber attacks on complex enterprise systems
-
P. C. Hershey and C. B. Silio, "Procedure for detection of and response to Distributed Denial of Service cyber attacks on complex enterprise systems," in Systems Conference (SysCon), 2012 IEEE International, 2012, pp. 1-6.
-
(2012)
Systems Conference (SysCon), 2012 IEEE International
, pp. 1-6
-
-
Hershey, P.C.1
Silio, C.B.2
-
14
-
-
78650517286
-
LAN attack detection using Discrete Event Systems
-
N. Hubballi, S. Biswas, S. Roopa, R. Ratti, and S. Nandi, "LAN attack detection using Discrete Event Systems," ISA Transactions, vol. 50, pp. 119-130, 2011.
-
(2011)
ISA Transactions
, vol.50
, pp. 119-130
-
-
Hubballi, N.1
Biswas, S.2
Roopa, S.3
Ratti, R.4
Nandi, S.5
-
15
-
-
84888868336
-
-
Available
-
C. P. software. (2012). Riverbed® Cascade® Pilot software. Available:http://www.riverbed.com/us/products/cascade/cascade_pilot.php
-
(2012)
Riverbed® Cascade® Pilot software
-
-
-
16
-
-
82055169294
-
-
R. Zhu and Y. Ma, Eds., ed: Springer London
-
L. Yang and D. Weng, "Snort-based Campus Network Security Intrusion Detection System Information Engineering and Applications." vol. 154, R. Zhu and Y. Ma, Eds., ed: Springer London, 2012, pp. 824-831.
-
(2012)
Snort-based Campus Network Security Intrusion Detection System Information Engineering and Applications
, vol.154
, pp. 824-831
-
-
Yang, L.1
Weng, D.2
|