-
1
-
-
0010006506
-
-
http://www.cis.upenn.edu/alur/onlinepub.html
-
Alur, R. 1998. Timed automata. http://www.cis.upenn.edu/alur/onlinepub.html.
-
(1998)
Timed automata
-
-
Alur, R.1
-
2
-
-
0028413052
-
A theory of timed automata
-
Apr. 25
-
Alur, R. and Dill, D. L. 1994. A theory of timed automata. Theor. Comput. Sci. 126, 2 (Apr. 25), 183-235.
-
(1994)
Theor. Comput. Sci.
, vol.126
, Issue.2
, pp. 183-235
-
-
Alur, R.1
Dill, D.L.2
-
3
-
-
0003964874
-
Next generation intrusion detection expert system (NIDES): A summary
-
SRI International, Menlo Park, CA. http://www2.csl.sri.com/nides/index5.html
-
Anderson, D., Frivold, T., and Valde, A. 1995. Next generation intrusion detection expert system (NIDES): A summary. Tech. Rep. Computer Science Laboratory, SRI International, Menlo Park, CA. http://www2.csl.sri.com/nides/index5.html.
-
(1995)
Tech. Rep. Computer Science Laboratory
-
-
Anderson, D.1
Frivold, T.2
Valde, A.3
-
4
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
(Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA. http://seclab.cs.ucdavis.edu/cheung.
-
Bradley, K. A., Cheung, S., Puketza, N., Mukherjee, B., and Olsson, O. 1998. Detecting disruptive routers: A distributed network monitoring approach. In Proceedings of the 1998 IEEE Symposium on Computer Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA. http://seclab.cs.ucdavis.edu/cheung.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Computer Security and Privacy
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, O.5
-
6
-
-
85024268796
-
Real-time protocol analysis for link-state routing
-
Computer Science Department, NC State, Raleigh, NC
-
Chang, H., Jou, Y., and Wu, S. 1998. Real-time protocol analysis for link-state routing. Tech. Rep. CDRL A007. Computer Science Department, NC State, Raleigh, NC.
-
(1998)
Tech. Rep. CDRL A007
-
-
Chang, H.1
Jou, Y.2
Wu, S.3
-
7
-
-
0012978694
-
Towards a taxonomy of intrusion-detection systems
-
IBM Zurich Laboratory, Zurich, Switzerland. http://domino.watson.ibm.com/library/cyberdig.nsf/
-
Debar, H., Dacier, M., and Wespi, A. 1998. Towards a taxonomy of intrusion-detection systems. Tech. Rep. IBM Zurich Laboratory, Zurich, Switzerland. http://domino.watson.ibm.com/library/cyberdig.nsf/.
-
(1998)
Tech. Rep.
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
9
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
(Oakland, CA, May). IEEE Press, Piscataway, NJ.
-
D'haeseleer, P., Forrest, S., and Helman, P. 1996. An immunological approach to change detection: Algorithms, analysis, and implications. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Press, Piscataway, NJ.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
10
-
-
84976834622
-
Self-stabilizing systems in spite of distributed control
-
Dijkstra, E. W. 1974. Self-stabilizing systems in spite of distributed control. Commun. ACM 17, 11, 643-644.
-
(1974)
Commun. ACM
, vol.17
, Issue.11
, pp. 643-644
-
-
Dijkstra, E.W.1
-
11
-
-
1842585733
-
Artificial intelligence and intrusion detection: Current and future directions
-
(oct.). http://seclab.cs.ucdavis.edu/papers.html.
-
Frank, J. 1994. Artificial intelligence and intrusion detection: Current and future directions. In Proceedings of the 17th National Conference on Computer Security (oct.). http://seclab.cs.ucdavis.edu/papers.html.
-
(1994)
Proceedings of the 17th National Conference on Computer Security
-
-
Frank, J.1
-
13
-
-
0027576069
-
Protocol verification made simple: a tutorial
-
(Apr.)
-
Gouda, M. G. 1993. Protocol verification made simple: a tutorial. Comput. Netw. ISDN Syst. 25, 9 (Apr.), 969-980.
-
(1993)
Comput. Netw. ISDN Syst.
, vol.25
, Issue.9
, pp. 969-980
-
-
Gouda, M.G.1
-
15
-
-
85024284689
-
-
http://www.cs.uiowa.edu/ftp/selfstab/main.html.
-
Herman, T. 2001. Stabilization research at Iowa. http://www.cs.uiowa.edu/ftp/selfstab/main.html.
-
(2001)
Stabilization research at Iowa
-
-
Herman, T.1
-
16
-
-
0003620778
-
-
Addison-Wesley, Reading, MA.
-
Hopcroft, J. and Ullman, J. 1979. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Reading, MA.
-
(1979)
Introduction to Automata Theory, Languages, and Computation.
-
-
Hopcroft, J.1
Ullman, J.2
-
17
-
-
0004154392
-
-
Prentice-Hall, Inc., Upper Saddle River, NJ.
-
Huitema, C. 1995. Routing in the Internet. Prentice-Hall, Inc., Upper Saddle River, NJ.
-
(1995)
Routing in the Internet.
-
-
Huitema, C.1
-
18
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
(Mar.)
-
Ilgun, K., Kemmerer, R. A., and Porras, P. A. 1995. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21, 3 (Mar.), 181-199.
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
19
-
-
0026154682
-
The SRI IDES statistical anomaly detector
-
(May). IEEE Computer Society Press, Los Alamitos, CA
-
Javitz, H. S. and Valdest, A. 1991. The SRI IDES statistical anomaly detector. In Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, CA, 316-326.
-
(1991)
Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy
, pp. 316-326
-
-
Javitz, H.S.1
Valdest, A.2
-
20
-
-
85024249477
-
Architecture design for a scalable intrusion detection for the emerging network infrastructure
-
Computer Science Department, NC State, Raleigh, NC. http://www.mcnc.org/HTML/ITD/ANR/JiNao.html.
-
Jou, Y., Gong, F., Sargor, C., Wu, S., and Cleaveland, W. 1997. Architecture design for a scalable intrusion detection for the emerging network infrastructure. Tech. Rep. Computer Science Department, NC State, Raleigh, NC. http://www.mcnc.org/HTML/ITD/ANR/JiNao.html.
-
(1997)
Tech. Rep.
-
-
Jou, Y.1
Gong, F.2
Sargor, C.3
Wu, S.4
Cleaveland, W.5
-
23
-
-
0001383866
-
An introduction to input/output automata
-
Lynch, N. A. and Tuttle, M. R. 1989. An introduction to input/output automata. CWI Q. 2, 3, 219-246.
-
(1989)
CWI Q.
, vol.2
, Issue.3
, pp. 219-246
-
-
Lynch, N.A.1
Tuttle, M.R.2
-
24
-
-
0008721904
-
-
ftp://ftp.isi.edu/in-notes/rfc2328.txt.
-
Moy, J. 1998a. RFC 2328: OSPF version 2. ftp://ftp.isi.edu/in-notes/rfc2328.txt.
-
(1998)
RFC 2328: OSPF version 2.
-
-
Moy, J.1
-
26
-
-
0028430224
-
Network intrusion detection
-
(Jan.)
-
Mukherjee, B., Heberlein, L. T., and Levitt, K. N. 1994. Network intrusion detection. IEEE Network 8, 1 (Jan.).
-
(1994)
IEEE Network
, vol.8
, Issue.1
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
27
-
-
0003529235
-
Automatic alarm correlation for fault identification
-
(INFOCOM'95, Boston, MA, Apr.). IEEE Press, Piscataway, NJ.
-
Rouvellou, I. and Hart, G. W. 1995. Automatic alarm correlation for fault identification. In Proceedings of the Conference on INFOCOM (INFOCOM'95, Boston, MA, Apr.). IEEE Press, Piscataway, NJ.
-
(1995)
Proceedings of the Conference on INFOCOM
-
-
Rouvellou, I.1
Hart, G.W.2
-
28
-
-
84880897051
-
A simple assertional proof system for real-time systems
-
(Dec.). IEEE Computer Society Press, Los Alamitos, CA.
-
Shankar, A. 1992. A simple assertional proof system for real-time systems. In Proceedings of the 13th IEEE Symposium on Real-Time Systems (Dec.). IEEE Computer Society Press, Los Alamitos, CA.
-
(1992)
Proceedings of the 13th IEEE Symposium on Real-Time Systems
-
-
Shankar, A.1
-
29
-
-
0028342073
-
Reasoning assertionally about real-time systems
-
(Jan.).
-
Shankar, A. 1994. Reasoning assertionally about real-time systems. Proc. IEEE 82, 1 (Jan.).
-
(1994)
Proc. IEEE
, vol.82
, Issue.1
-
-
Shankar, A.1
-
32
-
-
0031382705
-
An experimental study of insider attacks for the OSPF routing protocol
-
(ICNP'97, Atlanta, GA, Oct.). IEEE Computer Society Press, Los Alamitos, CA.
-
Vetter, B., Wang, F., and Wu, S. 1997. An experimental study of insider attacks for the OSPF routing protocol. In Proceedings of the IEEE International Conference on Network Protocols (ICNP'97, Atlanta, GA, Oct.). IEEE Computer Society Press, Los Alamitos, CA.
-
(1997)
Proceedings of the IEEE International Conference on Network Protocols
-
-
Vetter, B.1
Wang, F.2
Wu, S.3
-
33
-
-
85024252578
-
Design and implementation of a new intrusion detection approach: Property-oriented detection
-
Research Triangle Park, NC. http://worf.mcnc.org/fwang2.
-
Wang, F., Gong, F., and Wu, F. 2000. Design and implementation of a new intrusion detection approach: Property-oriented detection. Tech. Rep. MCNC, Research Triangle Park, NC. http://worf.mcnc.org/fwang2.
-
(2000)
Tech. Rep. MCNC
-
-
Wang, F.1
Gong, F.2
Wu, F.3
-
34
-
-
0013294535
-
Secure routing protocols: Theory and practice
-
Computer Science Department, NC State, Raleigh, NC. http://shang.csc.ncsu.edu/pubs.html/.
-
Wang, F., Vetter, B., and Wu, S. 1998. Secure routing protocols: Theory and practice. Tech. Rep. Computer Science Department, NC State, Raleigh, NC. http://shang.csc.ncsu.edu/pubs.html/.
-
(1998)
Tech. Rep.
-
-
Wang, F.1
Vetter, B.2
Wu, S.3
-
35
-
-
0003511389
-
-
Kluwer Academic Publishers, Hingham, MA.
-
Wang, J. 1998. Timed Petri Net. Kluwer Academic Publishers, Hingham, MA.
-
(1998)
Timed Petri Net.
-
-
Wang, J.1
-
36
-
-
85024244235
-
Intrusion detection for link-state routing protocols
-
(Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA.
-
Wu, S., Wang, F., Vetter, B., Cleaveland, R., Jou, Y., Gong, F., and Sargor, C. 1997. Intrusion detection for link-state routing protocols. In Proceedings of the 1997 IEEE Computer Society Symposium on Research in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA.
-
(1997)
Proceedings of the 1997 IEEE Computer Society Symposium on Research in Security and Privacy
-
-
Wu, S.1
Wang, F.2
Vetter, B.3
Cleaveland, R.4
Jou, Y.5
Gong, F.6
Sargor, C.7
|