메뉴 건너뛰기




Volumn 2516, Issue , 2002, Pages 158-176

Learning unknown attacks - A start

Author keywords

[No Author keywords available]

Indexed keywords

MERCURY (METAL); RANDOM ERRORS; WEB SERVICES; WORLD WIDE WEB;

EID: 84958977234     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36084-0_9     Document Type: Conference Paper
Times cited : (9)

References (19)
  • 1
    • 85067324940 scopus 로고    scopus 로고
    • Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons
    • Schneier, B: Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons, Inc., 2000 206, 210
    • (2000) Inc , vol.206 , pp. 210
    • Schneier, B.1
  • 7
    • 0033726577 scopus 로고    scopus 로고
    • Logic Induction of Valid Behavior Specifications for Intrusion Detection
    • Ko, Calvin: Logic Induction of Valid Behavior Specifications for Intrusion Detection. IEEE Symposium on Security and Privacy 2000: 142–153
    • (2000) IEEE Symposium on Security and Privacy , pp. 142-153
    • Ko, C.1
  • 8
    • 19544390827 scopus 로고    scopus 로고
    • System Health and Intrusion Monitoring Using a Hierarchy of Constraints
    • Ko, Calvin, Brutch, Paul, et al.: System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Recent Advances in Intrusion Detection 2001: 190–204
    • (2001) Recent Advances in Intrusion Detection , pp. 190-204
    • Ko, C.1    Brutch, P.2
  • 10
    • 85084097839 scopus 로고    scopus 로고
    • Self-securing storage: Protecting data in compromised system. Operating Systems Design and Implementation, San Diego, CA, 23–25 October 2000
    • Strunk, J.D., et al.: Self-securing storage: Protecting data in compromised system. Operating Systems Design and Implementation, San Diego, CA, 23–25 October 2000, USENIX Association, 2000 165–180
    • (2000) USENIX Association , pp. 165-180
    • Strunk, J.D.1
  • 14
    • 0004229237 scopus 로고    scopus 로고
    • Software Vulnerability Analysis
    • PhD thesis, IN, May
    • Krsul, I.V.: Software Vulnerability Analysis. PhD thesis, Purdue University, West Lafayette, IN, May, 1998, p. 17, available at https://www.cerias.purdue.edu/techreports-ssl/public/97-05.pdf
    • (1998) Purdue University, West Lafayette , pp. 17
    • Krsul, I.V.1
  • 18
    • 0003949225 scopus 로고
    • A Taxonomy of Security Faults in the Unix Operating System. Master's Thesis, Purdue University
    • Aslam, T.: A Taxonomy of Security Faults in the Unix Operating System. Master's Thesis, Purdue University, Department of Computer Sciences, August 1995. http://citeseer.nj.nec.com/aslam95taxonomy.html
    • (1995) Department of Computer Sciences , Issue.August
    • Aslam, T.1
  • 19
    • 84879522186 scopus 로고    scopus 로고
    • Categorization of Software Error that Led to Security Breaches
    • Department of Computer Science
    • Du, W. and Mathur, A.: Categorization of Software Error that Led to Security Breaches. Technical Report 97-09, Purdue University, Department of Computer Science, 1997
    • (1997) Technical Report 97-09, Purdue University
    • Du, W.1    Mathur, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.