-
1
-
-
0242697705
-
How to Write A Setuid Program
-
Bishop, M.: How to Write A Setuid Program. USENIX Login. 12(1), 5-11 (1987)
-
(1987)
USENIX Login
, vol.12
, Issue.1
, pp. 5-11
-
-
Bishop, M.1
-
4
-
-
69149100549
-
Seeing Is Not Believing
-
Farid, H.: Seeing Is Not Believing. IEEE Spectrum. 46(8), 44-51 (2009)
-
(2009)
IEEE Spectrum
, vol.46
, Issue.8
, pp. 44-51
-
-
Farid, H.1
-
6
-
-
33845688273
-
Structured Firewall Design
-
Gouda, M.G., Liu, A.X.: Structured Firewall Design. Comput. Networks. 51(4), 1106-1120 (2007)
-
(2007)
Comput. Networks
, vol.51
, Issue.4
, pp. 1106-1120
-
-
Gouda, M.G.1
Liu, A.X.2
-
7
-
-
33645337636
-
Taxonomy of Conflicts in Network Security Policies
-
Hamed, H., Al-Shaer, E.: Taxonomy of Conflicts in Network Security Policies. IEEE Comm. Mag. 44(3), 134-141 (2006)
-
(2006)
IEEE Comm. Mag
, vol.44
, Issue.3
, pp. 134-141
-
-
Hamed, H.1
Al-Shaer, E.2
-
13
-
-
36949010970
-
Inconsistency in Deception for Defense
-
Neagoe, V., Bishop, M.: Inconsistency in Deception for Defense. In: Proceedings of the 2006 Workshop on New Security Paradigms Schloss Dagstuhl, Germany, Sept. 19-22 pp. 31-38 (2006)
-
(2006)
Proceedings of the 2006 Workshop on New Security Paradigms Schloss Dagstuhl, Germany, Sept. 19-22
, pp. 31-38
-
-
Neagoe, V.1
Bishop, M.2
-
15
-
-
77957987275
-
A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets
-
Pozo, S., Ceballos, R., Gasca, R.M.: A Heuristic Process for Local Inconsistency Diagnosis in Firewall Rule Sets. J. Networks. 4(8), 698-710 (2009)
-
(2009)
J. Networks
, vol.4
, Issue.8
, pp. 698-710
-
-
Pozo, S.1
Ceballos, R.2
Gasca, R.M.3
-
16
-
-
84910679857
-
-
United States Patent#4,135,240, January 16, 1979
-
Ritchie, D.M.: Protection of Data File Contents, United States Patent#4,135,240, January 16, 1979 http://www.google.com/patent?vid=USPAT4135240 (2010)
-
(2010)
Protection of Data File Contents
-
-
Ritchie, D.M.1
-
17
-
-
70349127596
-
-
Salamat, B., Jackson, T., Gal, A.: Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space Proceedings of the 4th ACM European conference on Computer systems, pp. 33-46 (2009)
-
(2009)
Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space Proceedings of the 4th ACM European conference on Computer systems
, pp. 33-46
-
-
Salamat, B.1
Jackson, T.2
Gal, A.3
-
20
-
-
74549118982
-
Classification and Discovery of Rule Misconfigurations in Intrusion Detection and Response Devices
-
Stakhanova, N., Li, Y., Ghorbani, A.A.: Classification and Discovery of Rule Misconfigurations in Intrusion Detection and Response Devices. In: Proceedings of the World Congress on Privacy, Security, Trust and the Management of e-Business pp. 29-37 (2009)
-
(2009)
Proceedings of the World Congress on Privacy, Security, Trust and the Management of e-Business
, pp. 29-37
-
-
Stakhanova, N.1
Li, Y.2
Ghorbani, A.A.3
-
21
-
-
70449688944
-
-
USENIX Login
-
Tsafrir, D., Da Silva, D., Wagner, D.: The Murky Issue of Changing Process Identity: Revising ‘Setuid Demystified’, USENIX Login 33:3 pp. 55-66 (2008)
-
(2008)
The Murky Issue of Changing Process Identity: Revising ‘Setuid Demystified’
, vol.33
, Issue.3
, pp. 55-66
-
-
Tsafrir, D.1
Da Silva, D.2
Wagner, D.3
-
23
-
-
46449089083
-
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifacts
-
Ye, S., Sun, Q., Chang, E.C.: Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifacts, Proceedings of the IEEE International Conference on Multimedia and Expo pp. 12-15 (2007)
-
(2007)
Proceedings of the IEEE International Conference on Multimedia and Expo
, pp. 12-15
-
-
Ye, S.1
Sun, Q.2
Chang, E.C.3
|