-
1
-
-
24644501682
-
Limiting uncertainty in intrusion response
-
West Point, NY, 5-6 June
-
Curtis A. Carver, John M.D. Hill, and Udo W. Pooch, "Limiting Uncertainty in Intrusion Response," Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 5-6 June, 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy
-
-
Carver, C.A.1
Hill, J.M.D.2
Pooch, U.W.3
-
4
-
-
84867339043
-
Alert correlation in a cooperative intrusion detection framework
-
Oakland, USA
-
F. Cuppens and A. Miege, "Alert Correlation in a Cooperative Intrusion Detection Framework", In IEEE Symposium on Security and Privacy, Oakland, USA, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Cuppens, F.1
Miege, A.2
-
5
-
-
2642519111
-
The privilege graph: An extension to the typed access matrix model
-
(D. Gollman, Ed.), Lecture Notes in Computer Science, Springer-Verlag, Brighton, UK, November
-
M. Dacier and Y. Deswarte, "The Privilege Graph: an Extension to the Typed Access Matrix Model", in European Symposium in Computer Security (ESORICS'94), (D. Gollman, Ed.), Lecture Notes in Computer Science, 875, pp.319-334, Springer-Verlag, Brighton, UK, November 1994.
-
(1994)
European Symposium in Computer Security (ESORICS'94)
, vol.875
, pp. 319-334
-
-
Dacier, M.1
Deswarte, Y.2
-
6
-
-
0012945946
-
Models and tools for quantitative assessment of operational security
-
(S.K. Katsikas and D. Gritzalis, Eds.), Chapman & Hall, Samos (Greece), May
-
M. Dacier, Y. Deswarte and M. Kaâniche, "Models and Tools for Quantitative Assessment of Operational Security", in 12th International Information Security Conference (IFIP/SEC'96), (S.K. Katsikas and D. Gritzalis, Eds.), pp.177-186, Chapman & Hall, Samos (Greece), May 1996.
-
(1996)
12th International Information Security Conference (IFIP/SEC'96)
, pp. 177-186
-
-
Dacier, M.1
Deswarte, Y.2
Kaâniche, M.3
-
8
-
-
0037105910
-
Intrusion detection techniques and approaches
-
T. Verwoerd and R. Hunt, "Intrusion Detection Techniques and Approaches", In Computer Communications vol. 25, Issue 15, 2002.
-
(2002)
Computer Communications
, vol.25
, Issue.15
-
-
Verwoerd, T.1
Hunt, R.2
-
13
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington D.C., November
-
Peng Ning, Yun Cui, Douglas S. Reeves, "Constructing Attack Scenarios through Correlation of Intrusion Alerts", In Proceedings of the 9th ACM Conference on Computer & Communications Security (CCS 2002), pages 245-254, Washington D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer & Communications Security (CCS 2002)
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
14
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Rodolphe Ortalo and Yves Deswarte and Mohamed Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security", Journal of Software Engineering, vol. 25, no. 5, pp. 633-650, 1999.
-
(1999)
Journal of Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
15
-
-
85090433665
-
Snort - lightweight intrusion detection for networks
-
November
-
M. Roesch, "Snort - Lightweight Intrusion Detection for Networks", In Proceedings of USENIX LISA'99, November 1999.
-
(1999)
Proceedings of USENIX LISA'99
-
-
Roesch, M.1
-
16
-
-
84944763983
-
-
"Apache Open SSL Attack". At: http://www.cert.org/advisories/CA-2002-27.html
-
Apache Open SSL Attack
-
-
-
17
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J.A. Hoagland and J.M. McAlerney, "Practical Automated Detection of Stealthy Portscans", In the Journal of Computer Security, Volume 10, Issues 1/2, 2002, pp. 105-136.
-
(2002)
The Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
|