-
1
-
-
81455158615
-
-
National Cyber Security Division.S. Department of Homeland Security, September
-
Cyber Storm Exercise Report. National Cyber Security Division, U.S. Department of Homeland Security, September, 2006, 2006.
-
(2006)
Cyber Storm Exercise Report
, pp. 2006
-
-
-
2
-
-
34249723796
-
Specification and verification of security requirements in a programming model for decentralized cscw systems
-
T. Ahmed and A. R. Tripathi. Specification and verification of security requirements in a programming model for decentralized cscw systems. ACM Trans. Inf. Syst. Secur., 10(2):7, 2007.
-
(2007)
ACM Trans. Inf. Syst. Secur
, vol.10
, Issue.2
, pp. 7
-
-
Ahmed, T.1
Tripathi, A.R.2
-
3
-
-
80052284797
-
Defining incident management processes for csirts: A work in progress
-
C. Alberts, A. Dorofee, G. Killcrece, R. Ruefle, and M. Zajicek. Defining Incident Management Processes for CSIRTs: A Work in Progress. Technical Report CMU/SEI-2004-TR-015, Software Engineering Institute, Carnegie Mellon University, 2004.
-
(2004)
Technical Report CMU/SEI-2004-TR-015, Software Engineering Institute, Carnegie Mellon University
-
-
Alberts, C.1
Dorofee, A.2
Killcrece, G.3
Ruefle, R.4
Zajicek, M.5
-
4
-
-
84891379429
-
CyberIntegrator: A meta-workflow system designed for solving complex scientific problems using heterogeneous tools
-
May
-
P. Bajcsy, R. Kooper, L. Marini, B. Minsker, and J. Myers. CyberIntegrator: A Meta-Workflow System Designed for Solving Complex Scientific Problems using Heterogeneous Tools. In Proceedings of the Geoinformatics Conference, May 2006.
-
(2006)
Proceedings of the Geoinformatics Conference
-
-
Bajcsy, P.1
Kooper, R.2
Marini, L.3
Minsker, B.4
Myers, J.5
-
6
-
-
19844379355
-
A hierarchical objectives-based framework for the digital investigations process
-
N. Beebe and J. G. Clark. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation, 2(2):147-167, 2005.
-
(2005)
Digital Investigation
, vol.2
, Issue.2
, pp. 147-167
-
-
Beebe, N.1
Clark, J.G.2
-
7
-
-
85026319589
-
Usable secure mailing lists with untrusted servers
-
R. Bobba, J. Muggli, M. Pant, J. Basney, and H. Khurana. Usable secure mailing lists with untrusted servers. In Symposium on Identity and Trust on the Internet (IDtrust), 2009.
-
(2009)
Symposium on Identity and Trust on the Internet (IDtrust
-
-
Bobba, R.1
Muggli, J.2
Pant, M.3
Basney, J.4
Khurana, H.5
-
8
-
-
85026299863
-
Handbook for Computer Security Incident Response Teams (CSIRTs)
-
M. J. W. Brown, D. Stikvoort, K. P. Kossakowski, K. P. Kossakowski, G. Killcrece, R. Ruefle, and M. Zajicek. Handbook for Computer Security Incident Response Teams (CSIRTs). CMU/SEI-2003-HB-002, April, 2003, 2003.
-
(2003)
CMU/SEI-2003-HB-002 April
, pp. 2003
-
-
Brown, M.J.W.1
Stikvoort, D.2
Kossakowski, K.P.3
Kossakowski, K.P.4
Killcrece, G.5
Ruefle, R.6
Zajicek, M.7
-
9
-
-
70450124985
-
Expectations for computer security incident response
-
June
-
N. Brownlee and E. Guttman. Expectations for Computer Security Incident Response. IETF RFC 2350, June 1998.
-
(1998)
IETF RFC 2350
-
-
Brownlee, N.1
Guttman, E.2
-
10
-
-
3142758707
-
Maids: Mining alarming incidents from data streams
-
New York, NY, USA ACM Press
-
Y. D. Cai, D. Clutter, G. Pape, J. Han, M. Welge, and L. Auvil. Maids: mining alarming incidents from data streams. In SIGMOD 04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pages 919-920, New York, NY, USA, 2004. ACM Press.
-
(2004)
SIGMOD 04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
, pp. 919-920
-
-
Cai, Y.D.1
Clutter, D.2
Pape, G.3
Han, J.4
Welge, M.5
Auvil, L.6
-
14
-
-
84970947585
-
Software engineering for security: A roadmap
-
New York, NY, USA rftxt ACM Press
-
P. T. Devanbu and S. Stubblebine. Software engineering for security: A roadmap. In ICSE 00: Proceedings of the Conference on The Future of Software Engineering, pages 227-239, New York, NY, USA, 2000. ACM Press.
-
(2000)
ICSE 00: Proceedings of the Conference on the Future of Software Engineering
, pp. 227-239
-
-
Devanbu, P.T.1
Stubblebine, S.2
-
17
-
-
84865223572
-
Computer security incident handling guide: Recommendations of the national institute of standards and technology
-
January
-
T. Grance, K. Kent, and B. Kim. Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-61, January 2004.
-
(2004)
NIST Special Publication
, pp. 800-861
-
-
Grance, T.1
Kent, K.2
Kim, B.3
-
18
-
-
33746255206
-
FORZA-Digital forensics investigation framework that incorporate legal issues
-
R. S. C. Ieong. FORZA-Digital forensics investigation framework that incorporate legal issues. Digital Investigation, 3(Supplement-1):29-36, 2006.
-
(2006)
Digital Investigation
, vol.3
, pp. 29-36
-
-
Ieong, R.S.C.1
-
20
-
-
33644505148
-
SELS: A secure e-mail list service
-
H. Khurana, A. J. Slagell, and R. Bonilla. SELS: A secure e-mail list service. In ACM Symposium on Applied Computing (SAC), Security Track, pages 306-313, 2005.
-
(2005)
ACM Symposium on Applied Computing (SAC), Security Track
, pp. 306-313
-
-
Khurana, H.1
Slagell, A.J.2
Bonilla, R.3
-
23
-
-
33746748784
-
On incident handling and response: A state-of-The-Art approach
-
July
-
S. Mitropoulos, D. Patsos, and C. Douligeris. On Incident Handling and Response: A state-of-The-Art approach. Computers & Security, 25(5):351-370, July 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.5
, pp. 351-370
-
-
Mitropoulos, S.1
Patsos, D.2
Douligeris, C.3
-
24
-
-
85026295617
-
-
Technical Report Technical Report DTR-T001-01 Report From the First Digital Forensic Research Workshop (DFRWS
-
G. Palmer. A Road Map for Digital Forensic Research. Technical Report Technical Report DTR-T001-01, Report From the First Digital Forensic Research Workshop (DFRWS), 2001.
-
(2001)
A Road Map for Digital Forensic Research
-
-
Palmer, G.1
-
31
-
-
68949141384
-
Case-relevance information investigation: Binding computer intelligence to the current computer forensic framework
-
Spring
-
G. Ruibin, C. Kai, Y. Tony, and M. Gaertner. Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework. International Journal of Digital Evidence, 4(1), Spring 2005.
-
(2005)
International Journal of Digital Evidence
, vol.4
, pp. 1
-
-
Ruibin, G.1
Kai, C.2
Tony, Y.3
Gaertner, M.4
-
32
-
-
39049090038
-
Inoculating ssh against address harvesting
-
San Diego, CA February
-
S. Schechter, J. Jung, W. Stockwell, and C. McLain. Inoculating SSH Against Address Harvesting. In NDSS06: The 13th Annual Network and Distributed System Security Symposium, San Diego, CA, February 2006.
-
(2006)
NDSS06: The 13th Annual Network and Distributed System Security Symposium
-
-
Schechter, S.1
Jung, J.2
Stockwell, W.3
McLain, C.4
-
35
-
-
34248376267
-
-
OReilly Media Aug
-
J. Vincent, R. Spier, D. Rolsky, D. Chamberlain, and R. Foley. RT Essentials. OReilly Media, Aug. 2005.
-
(2005)
RT Essentials
-
-
Vincent, J.1
Spier, R.2
Rolsky, D.3
Chamberlain, D.4
Foley, R.5
|