-
1
-
-
84865223572
-
Computer security incident handling guide
-
P. Chichonski, T. Millar, T. Grance, and K. Scarfone, "Computer Security Incident Handling Guide," NIST SP 800-61
-
NIST SP
, pp. 800-861
-
-
Chichonski, P.1
Millar, T.2
Grance, T.3
Scarfone, K.4
-
3
-
-
84998683824
-
Structure and security strategy of a secure gigabit network system, kuins-iii (in japanese
-
H. Takakura, Y. Ebara, S. Miyazaki, A. Sawada, M. Nakamura, and Y. Okabe, "Structure and Security Strategy of a Secure Gigabit Network system, KUINS-III (in Japanese)," IEICE Trans. Commun., 86:1494-1501, 2003
-
(2003)
IEICE Trans. Commun
, vol.86
, pp. 1494-1501
-
-
Takakura, H.1
Ebara, Y.2
Miyazaki, S.3
Sawada, A.4
Nakamura, M.5
Okabe, Y.6
-
4
-
-
0347720836
-
An adaptive policy-based framework for network services management
-
L. Lymberopoulos, E. Lupu, M. Sloman, "An Adaptive Policy-Based Framework for Network Services Management," Journal of Network and Systems Management, Vol.11, Issue 3, pp 277-303
-
Journal of Network and Systems Management
, vol.11
, Issue.3
, pp. 277-303
-
-
Lymberopoulos, L.1
Lupu, E.2
Sloman, M.3
-
5
-
-
84862060708
-
Network configuration protocol (netconf
-
R. Enns, M. Bjorklund, J. Schoenwaelder, A. Bierman, "Network Configuration Protocol (NETCONF)," RFC6241, 2011
-
(2011)
RFC6241
-
-
Enns, R.1
Bjorklund, M.2
Schoenwaelder, J.3
Bierman, A.4
-
6
-
-
84964467772
-
Automatic management of network security policy
-
J. Burns, A. Cheng, P. Gurung, S. Rajagopalan, P. Rao, D. Rosenbluth, A.V. Surendran, D.M. Martin.Jr, "Automatic management of network security policy," DARPA Information Survivability Conference & Exposition II, 2001, Vol.2, pp12-26
-
(2001)
DARPA Information Survivability Conference & Exposition II
, vol.2
, pp. 12-26
-
-
Burns, J.1
Cheng, A.2
Gurung, P.3
Rajagopalan, S.4
Rao, P.5
Rosenbluth, D.6
Surendran, A.V.7
Martin, D.M.8
-
7
-
-
84891301295
-
Ariguma code analyzer: Efficient variant detection by identifying common instruction sequences in malware families
-
Y. Zhong, H. Yamaki, Y. Yamaguchi, and H. Takakura, "ARIGUMA Code Analyzer: Efficient Variant Detection by Identifying Common Instruction Sequences in Malware Families. in The 37th Annual International Computers, Software and Applications Conference (COMPSAC2013), 2013
-
(2013)
The 37th Annual International Computers, Software and Applications Conference (COMPSAC2013
-
-
Zhong, Y.1
Yamaki, H.2
Yamaguchi, Y.3
Takakura, H.4
-
8
-
-
84867976535
-
Unknown attacks detection using feature extraction from anomaly-based ids alerts
-
M. Sato, H. Yamaki, and H. Takakura, "Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS Alerts. in The Third Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2012), pp 273-277, 2012
-
(2012)
The Third Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2012
, pp. 273-277
-
-
Sato, M.1
Yamaki, H.2
Takakura, H.3
-
9
-
-
84928631572
-
Development of a secure traffic analysis system to trace malicious activities on internal networks
-
in press
-
S. Hirono, Y. Yamaguchi, H. Shimada, and H. Takakura, "Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks. in The 38th Annual International Computers, Software and Applications Conference (COMPSAC2014). in press
-
The 38th Annual International Computers, Software and Applications Conference (COMPSAC2014
-
-
Hirono, S.1
Yamaguchi, Y.2
Shimada, H.3
Takakura, H.4
|