-
1
-
-
0003791899
-
-
Prentice-Hall, Inc
-
Aho, A.V., Ullman, J.D.: The Theory of Parsing, Translation, and Compiling, Vol. 1, 2, Prentice-Hall, Inc. (1972)
-
(1972)
The Theory of Parsing, Translation, and Compiling, Vol. 1
, vol.2
-
-
Aho, A.V.1
Ullman, J.D.2
-
2
-
-
4444272036
-
Towards a Taxonomy of Intrusion Detection Systems and Attacks. MAFTIA deliverable D3. Version 1.01. Project IST-1999-11583
-
Alessandri, D., Cachin, C., Dacier, M., Deak, O., Julisch, K., Randell, B., Riordan, J., Tscharner, A., Wespi, A., Wuest, C.: Towards a Taxonomy of Intrusion Detection Systems and Attacks. MAFTIA deliverable D3. Version 1.01. Project IST-1999-11583. Malicious- and Accidental-Fault Tolerance for Internet Applications (2001)
-
(2001)
Malicious- and Accidental-Fault Tolerance for Internet Applications
-
-
Alessandri, D.1
Cachin, C.2
Dacier, M.3
Deak, O.4
Julisch, K.5
Randell, B.6
Riordan, J.7
Tscharner, A.8
Wespi, A.9
Wuest, C.10
-
3
-
-
0006103497
-
A standard audit trail format. Technical report, Department of Computer Science
-
Bishop, M.: A standard audit trail format. Technical report, Department of Computer Science, University of California at Davis (1995)
-
(1995)
University of California at Davis
-
-
Bishop, M.1
-
4
-
-
84969375078
-
-
Custom Attack Simulation Language (CASL). Secure Networks (1998)
-
(1998)
Secure Networks
-
-
-
5
-
-
84958776699
-
Network Security Modeling and Cyber Attack Simulation Methodology. Lecture Notes in Computer Science
-
Chi, S.-D., Park, J.S., Jung, K.-C., Lee, J.-S.: Network Security Modeling and Cyber Attack Simulation Methodology. Lecture Notes in Computer Science, Vol.2119 (2001)
-
(2001)
Vol
, pp. 2119
-
-
Chi, S.-D.1
Park, J.S.2
Jung, K.-C.3
Lee, J.-S.4
-
6
-
-
0003112690
-
Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions
-
Chung, M., Mukherjee, B., Olsson, R.A., Puketza, N.: Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions. Proceedings of the 18th NISSC (1995)
-
(1995)
Proceedings of the 18Th NISSC
-
-
Chung, M.1
Mukherjee, B.2
Olsson, R.A.3
Puketza, N.4
-
7
-
-
0030701247
-
Information System Attacks: A Preliminary Classification Scheme
-
Cohen, F.B.: Information System Attacks: A Preliminary Classification Scheme. Computers and Security, Vol.16, No.1 (1997)
-
(1997)
Computers and Security
, vol.16
, Issue.1
-
-
Cohen, F.B.1
-
8
-
-
84959005823
-
-
IEEE Symposium on Security and Privacy, Berkeley, CA
-
Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. IEEE Symposium on Security and Privacy, Berkeley, CA (1999)
-
(1999)
Simulating Cyber Attacks, Defenses, and Consequences
-
-
Cohen, F.1
-
10
-
-
84969382914
-
Intrusion detection message exchange format, extensible markup language (Xml) document type definition
-
Curry, D.: Intrusion detection message exchange format, extensible markup language (xml) document type definition. draft-ietf-idwg-idmef-xml-02.txt (2000)
-
(2000)
Draft-Ietf-Idwg-Idmef-Xml-02.Txt
-
-
Curry, D.1
-
11
-
-
2542563730
-
An experimentation workbench for intrusion detection systems
-
IBM Research Division, Zurich Research Laboratory
-
Debar, H., Dacier, M., Wespi, A., Lampart, S.: An experimentation workbench for intrusion detection systems. Research Report RZ-2998 (# 93044). IBM Research Division, Zurich Research Laboratory (1998)
-
(1998)
Research Report RZ-2998 (# 93044)
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
12
-
-
84959005825
-
-
Athens, Greece
-
Eckmann, S.T., Vigna, G., Kemmerer, R.A.: STATL: An Attack Language for State-based Intrusion Detection. Proceedings of the ACM Workshop on Intrusion Detection, Athens, Greece (2000)
-
(2000)
STATL: An Attack Language for State-Based Intrusion Detection. Proceedings of the ACM Workshop on Intrusion Detection
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
13
-
-
0342602262
-
A common intrusion specification language (Cisl)
-
Feiertag, R., Kahn, C., Porras, P., Schnackenberg, D., Staniford-Chen, S., Tung, B.: A common intrusion specification language (cisl). specification draft (1999)
-
(1999)
Specification Draft
-
-
Feiertag, R.1
Kahn, C.2
Porras, P.3
Schnackenberg, D.4
Staniford-Chen, S.5
Tung, B.6
-
15
-
-
84959005827
-
Algebra, Languages, Programming
-
(In Russian)
-
Glushkov, V., Tseitlin, G., Yustchenko, E.: Algebra, Languages, Programming. Naukova Dumka Publishers, Kiev (1978) (In Russian).
-
(1978)
Naukova Dumka Publishers, Kiev
-
-
Glushkov, V.1
Tseitlin, G.2
Yustchenko, E.3
-
16
-
-
3042647003
-
Software Development Kit for Multi-agent Systems Design and Implementation
-
Springer Verlag
-
Gorodetski, V., Karsayev, O., Kotenko, I., Khabalov, A.: Software Development Kit for Multi-agent Systems Design and Implementation. Lecture Notes in Artificial Intelligence, Vol. 2296, Springer Verlag (2002)
-
(2002)
Lecture Notes in Artificial Intelligence
, vol.2296
-
-
Gorodetski, V.1
Karsayev, O.2
Kotenko, I.3
Khabalov, A.4
-
17
-
-
84969400039
-
-
Hailstorm. Users Manual, 1.0 (2000) http://www.clicktosecure.com/
-
(2000)
Users Manual, 1.0
-
-
-
18
-
-
0003615205
-
A Common Language for Computer Security Incidents, SANDIA REPORT
-
Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents, SANDIA REPORT, SAND98-8667 (1998)
-
(1998)
SAND98-8667
-
-
Howard, J.D.1
Longstaff, T.A.2
-
19
-
-
84969395962
-
A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis. RAID’98
-
Huang, M.-Y., Wicks, T.M.: A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis. RAID’98, Louvain-la-Neuve (1998)
-
(1998)
Louvain-La-Neuve
-
-
Huang, M.-Y.1
Wicks, T.M.2
-
20
-
-
0004265173
-
-
Inc., Sebastopol, CA
-
Icove, D., Seger K., VonStorch, W.: Computer Crime: A Crimefighter’s Handbook, O’Reilly and Associates, Inc., Sebastopol, CA (1995)
-
(1995)
Computer Crime: A Crimefighter’s Handbook, O’Reilly and Associates
-
-
Icove, D.1
Seger, K.2
Vonstorch, W.3
-
21
-
-
84969400037
-
User Guide
-
IDS Informer 3.0. User Guide. BLADE Software (2001)
-
(2001)
BLADE Software
-
-
-
22
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection System
-
Iglun, K., Kemmerer, R.A., Porras, P.A.: State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, Vol. 21, No.3 (1995)
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
-
-
Iglun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
24
-
-
0004229237
-
-
Purdue University, Lafayette, IN
-
Krsul, I.V.: Software Vulnerability Analysis, Ph.D. Dissertation, Computer Sciences Department, Purdue University, Lafayette, IN (1998)
-
(1998)
Software Vulnerability Analysis, Ph.D. Dissertation, Computer Sciences Department
-
-
Krsul, I.V.1
-
25
-
-
0030676601
-
How to Systematically Classify Computer Security Intrusion
-
IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA
-
Lindqvist, U., Jonsson, E.: How to Systematically Classify Computer Security Intrusions. Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA (1997)
-
(1997)
Proceedings of The
, vol.1997
-
-
Lindqvist, U.1
Jonsson, E.2
-
26
-
-
84944222170
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. RAID’2000, Lecture Notes in Computer Science, Vol.1907 (2000)
-
(2000)
RAID’2000, Lecture Notes in Computer Science
, vol.1907
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
29
-
-
27244453070
-
Gassata, a genetic algorithm as an alternative tool for security audit trails analysis
-
Me, L.: Gassata, a genetic algorithm as an alternative tool for security audit trails analysis. RAID’98, Louvain-la-Neuve (1998)
-
(1998)
RAID’98, Louvain-La-Neuve
-
-
Me, L.1
-
33
-
-
84969398307
-
-
http://www.ontology.org/
-
-
-
-
35
-
-
3643079262
-
A Software Platform for Testing Intrusion Detection Systems
-
Puketza, N., Chung, M., Olsson, R.A., Mukherjee, B.: A Software Platform for Testing Intrusion Detection Systems. IEEE Software, Vol.14, No.5 (1997)
-
(1997)
IEEE Software
, vol.14
, Issue.5
-
-
Puketza, N.1
Chung, M.2
Olsson, R.A.3
Mukherjee, B.4
-
36
-
-
33646162676
-
Distributed Metastasis: A Computer Network Penetration Methodology
-
(Phrack Magazine
-
Stewart, A.J.: Distributed Metastasis: A Computer Network Penetration Methodology. The Packet Factory (1999) (Phrack Magazine, Vol. 9, Issue 55)
-
(1999)
The Packet Factory
, vol.9
, Issue.55
-
-
Stewart, A.J.1
-
38
-
-
84959005836
-
-
Proceedings of the IEEE Information Survivability Workshop, Boston
-
Vigna, G., Eckmann, S.T., Kemmerer, R.A.: Attack Languages. Proceedings of the IEEE Information Survivability Workshop, Boston (2000)
-
(2000)
Attack Languages
-
-
Vigna, G.1
Eckmann, S.T.2
Kemmerer, R.A.3
-
39
-
-
84959005837
-
Intrusion Detection for an On- Going Attack
-
USA
-
Yuill, J., Wu, F., Settle, J., Gong, F., Huang, M.: Intrusion Detection for an On- Going Attack. RAID’99, West Lafayette, Indiana, USA (1999)
-
(1999)
RAID’99, West Lafayette, Indiana
-
-
Yuill, J.1
Wu, F.2
Settle, J.3
Gong, F.4
Huang, M.5
-
40
-
-
0034300584
-
Intrusiondetection for incident-response, using a military battlefield-intelligence process
-
Yuill, J., Wu, F., Settle, J., Gong, F., Forno, R., Huang, M., Asbery, J.: Intrusiondetection for incident-response, using a military battlefield-intelligence process. Computer Networks, No. 34 (2000)
-
(2000)
Computer Networks
, vol.34
-
-
Yuill, J.1
Wu, F.2
Settle, J.3
Gong, F.4
Forno, R.5
Huang, M.6
Asbery, J.7
|