-
1
-
-
0037986866
-
-
SRI International Computer Science Laboratory Technical Report SRI-CSL-95-07, May
-
D. Anderson, T. F. Lunt, H. Javitz, A. Tamaru and A. Valdes, "Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES)", SRI International Computer Science Laboratory Technical Report SRI-CSL-95-07, May 1995.
-
(1995)
Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES)
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
4
-
-
84968910861
-
-
CERT Coordination Center Denial of Service
-
CERT Coordination Center Denial of Service, http://www.cert.org/tech-ttps/deniaLofservice.html.
-
-
-
-
8
-
-
84968831566
-
-
Firewall Software White Paper
-
Firewall Software White Paper, http://www.firewall-software.com/firewalLfaws/types-of-firewall.html.
-
-
-
-
10
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
F. Hohl, "Time limited blackbox security: Protecting mobile agents from malicious hosts", Mobile Agents and Security, Lecture Notes in Computer Science 1419 (1998) 92-113.
-
(1998)
Mobile Agents and Security, Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
12
-
-
84958968002
-
Secure transactions with mobile agents in hostile environments
-
P. Kotzanikolaou, M. Burmester and V. Chrissikopoulos, "Secure transactions with mobile agents in hostile environments", ACISP 2000, Lecture Notes in Computer Science 1841 (2000) 289-297.
-
(2000)
ACISP 2000, Lecture Notes in Computer Science
, vol.1841
, pp. 289-297
-
-
Kotzanikolaou, P.1
Burmester, M.2
Chrissikopoulos, V.3
-
14
-
-
85006563765
-
Extended elementary object system model for mobile agent security
-
December 3-6
-
L. Ma, J. J. P. Tsai, Y. Deng and T. Murata, "Extended elementary object system model for mobile agent security", Proceedings of 2003 World Congress on Integrated Design and Process Technology (December 3-6, 2003) 169-178.
-
(2003)
Proceedings of 2003 World Congress on Integrated Design and Process Technology
, pp. 169-178
-
-
Ma, L.1
Tsai, J.J.P.2
Deng, Y.3
Murata, T.4
-
16
-
-
84968705257
-
Modeling and analysis of a secure mobile agent system using extended elementary object system
-
submitted to
-
L. Ma, J. J. P. Tsai and Z. Yu, "Modeling and analysis of a secure mobile agent system using extended elementary object system", submitted to IEEE Transaction on Software Engineering.
-
IEEE Transaction on Software Engineering
-
-
Ma, L.1
Tsai, J.J.P.2
Yu, Z.3
-
23
-
-
0037510581
-
Authentication, access control, and intrusion detection
-
CRC Press
-
R. S. Sandhu and P. Samarati, "Authentication, access control, and intrusion detection", The Computer Science and Engineering Handbook (CRC Press, 1997) 1929-1948.
-
(1997)
The Computer Science and Engineering Handbook
, pp. 1929-1948
-
-
Sandhu, R.S.1
Samarati, P.2
-
25
-
-
17644399080
-
Underlying technical models for information technology security
-
December
-
G. Stoneburner, "Underlying technical models for information technology security", NIST Special Publication 800-33, December 2001.
-
(2001)
NIST Special Publication 800-33
-
-
Stoneburner, G.1
-
31
-
-
0003861085
-
Relating different semantics for object petri nets - Formal proofs and examples
-
University of Hamburg, Department for Computer Science, April
-
R. Valk, "Relating different semantics for object petri nets - Formal proofs and examples", Technical Report FBI-HH-B-226, University of Hamburg, Department for Computer Science, April 2000, pp. 1-50.
-
(2000)
Technical Report FBI-HH-B-226
, pp. 1-50
-
-
Valk, R.1
-
33
-
-
0002717089
-
Cryptographic traces for mobile agents, mobile agents and security
-
G. Vigna, "Cryptographic traces for mobile agents, mobile agents and security", Lecture Notes in Computer Science ljl9 (1998) 137-150.
-
(1998)
Lecture Notes in Computer Science ljl9
, pp. 137-150
-
-
Vigna, G.1
|