-
3
-
-
35248836533
-
Using specification-based intrusion detection for automated response
-
Pittsburgh, PA, USA, September 8-10, Proceedings
-
BALEPIN, I., MALTSEV, S., ROWE, J., AND LEVITT, K. N. Using specification-based intrusion detection for automated response. In Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, Proceedings (2003), pp. 136–154.
-
(2003)
Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003
, pp. 136-154
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.N.4
-
4
-
-
84857771025
-
Specification-based intrusion detection for advanced metering infrastructures
-
Pasadena, CA, USA, December 12-14
-
BERTHIER, R., AND SANDERS, W. H. Specification-based intrusion detection for advanced metering infrastructures. In 17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, USA, December 12-14 (2011), pp. 184–193.
-
(2011)
17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011
, pp. 184-193
-
-
Berthier, R.1
Sanders, W.H.2
-
5
-
-
84893206793
-
On the feasibility of device fingerprinting in industrial control systems
-
Amsterdam, The Netherlands, September 16-18, Revised Selected Papers
-
CASELLI, M., HADŽIOSMANOVIĆ, D., ZAMBON, E., AND KARGL, F. On the feasibility of device fingerprinting in industrial control systems. In Critical Information Infrastructures Security - 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, Revised Selected Papers (2013), pp. 155–166.
-
(2013)
Critical Information Infrastructures Security - 8th International Workshop, CRITIS 2013
, pp. 155-166
-
-
Caselli, M.1
Hadžiosmanović, D.2
Zambon, E.3
Kargl, F.4
-
6
-
-
84865461253
-
Flow-based security issue detection in building automation and control networks
-
Budapest, Hungary, August 29-31, Proceedings
-
ČELEDA, P., KREJČÍ, R., AND KRMÍČEK, V. Flow-based security issue detection in building automation and control networks. In Information and Communication Technologies - 18th EUNICE/ IFIP WG 6.2, 6.6 International Conference, EUNICE 2012, Budapest, Hungary, August 29-31, Proceedings (2012), pp. 64–75.
-
(2012)
Information and Communication Technologies - 18th EUNICE/ IFIP WG 6.2, 6.6 International Conference, EUNICE 2012
, pp. 64-75
-
-
Čeleda, P.1
Krejčí, R.2
Krmíček, V.3
-
7
-
-
79959294299
-
A specification based intrusion detection framework for mobile phones
-
CHAUGULE, A., XU, Z., AND ZHU, S. A specification based intrusion detection framework for mobile phones. In Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, Proceedings (2011), pp. 19–37.
-
(2011)
Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, Proceedings
, pp. 19-37
-
-
Chaugule, A.1
Xu, Z.2
Zhu, S.3
-
8
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
Miami Beach, Florida, USA, 7 December
-
CHEUNG, S., DUTERTRE, B., FONG, M., LINDQVIST, U., SKINNER, K., AND VALDES, A. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA Security Scientific Symposium, Miami Beach, Florida, USA, 7 December (2007), pp. 1–12.
-
(2007)
Proceedings of the SCADA Security Scientific Symposium
, pp. 1-12
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
9
-
-
84920389231
-
An intrusion-detection model
-
Oakland, California, USA, April 7-9
-
DENNING, D. E. An intrusion-detection model. In Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 7-9 (1986), pp. 118–133.
-
(1986)
Proceedings of the 1986 IEEE Symposium on Security and Privacy
, pp. 118-133
-
-
Denning, D.E.1
-
11
-
-
0005421060
-
-
ECHELON CORPORATION. LonTalk protocol specification v3.0, 1994. http://www.enerlon.com/JobAids/Lontalk%20Protocol%20Spec.pdf.
-
(1994)
LonTalk Protocol Specification V3.0
-
-
-
13
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA, USA, May 6-8
-
FORREST, S., HOFMEYR, S. A., SOMAYAJI, A., AND LONGSTAFF, T. A. A sense of self for Unix processes. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 6-8 (1996), pp. 120–128.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
77954330725
-
Modbus/DNP3 state-based intrusion detection system
-
Perth, Australia, April 20-13
-
FOVINO, I. N., CARCANO, A., MUREL, T. D. L., TROMBETTA, A., AND MASERA, M. Modbus/DNP3 state-based intrusion detection system. In 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, April 20-13 (2010), pp. 729–736.
-
(2010)
24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010
, pp. 729-736
-
-
Fovino, I.N.1
Carcano, A.2
Murel, T.D.L.3
Trombetta, A.4
Masera, M.5
-
15
-
-
0040076126
-
Automatic labeling of semantic roles
-
GILDEA, D., AND JURAFSKY, D. Automatic labeling of semantic roles. Computational Linguistics 28, 3 (2002), 245–288.
-
(2002)
Computational Linguistics
, vol.28
, Issue.3
, pp. 245-288
-
-
Gildea, D.1
Jurafsky, D.2
-
16
-
-
39049109285
-
Specification-based intrusion detection in WLANs
-
Miami Beach, Florida, USA, 11-15 December
-
GILL, R., SMITH, J., AND CLARK, A. J. Specification-based intrusion detection in WLANs. In 22nd Annual Computer Security Applications Conference (ACSAC 2006), Miami Beach, Florida, USA, 11-15 December (2006), pp. 141–152.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC 2006)
, pp. 141-152
-
-
Gill, R.1
Smith, J.2
Clark, A.J.3
-
17
-
-
85014162521
-
-
Tech. rep
-
GRANZER, W., KASTNER, W., NEUGSCHWANDTNER, G., AND PRAUS, F. Security in networked building automation systems. Tech. rep., 2005.
-
(2005)
Security in Networked Building Automation Systems
-
-
Granzer, W.1
Kastner, W.2
Neugschwandtner, G.3
Praus, F.4
-
18
-
-
77956599919
-
Security in building automation systems
-
GRANZER, W., PRAUS, F., AND KASTNER, W. Security in building automation systems. IEEE Trans. Industrial Electronics 57, 11 (2010), 3622–3630.
-
(2010)
IEEE Trans. Industrial Electronics
, vol.57
, Issue.11
, pp. 3622-3630
-
-
Granzer, W.1
Praus, F.2
Kastner, W.3
-
19
-
-
84992172210
-
Evaluation of a specification-based intrusion detection system for AODV
-
GRÖNKVIST, J., HANSSON, A., AND SKÖLD, M. Evaluation of a specification-based intrusion detection system for AODV. In The Sixth Annual Mediterranean Ad Hoc Networking Workshop (2007), pp. 121–128.
-
(2007)
The Sixth Annual Mediterranean Ad Hoc Networking Workshop
, pp. 121-128
-
-
Grönkvist, J.1
Hansson, A.2
Sköld, M.3
-
20
-
-
77953581925
-
Networked control system: Overview and research trends
-
GUPTA, R. A., AND CHOW, M. Networked control system: Overview and research trends. IEEE Trans. Industrial Electronics 57, 7 (2010), 2527–2535.
-
(2010)
IEEE Trans. Industrial Electronics
, vol.57
, Issue.7
, pp. 2527-2535
-
-
Gupta, R.A.1
Chow, M.2
-
21
-
-
77949908962
-
Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration
-
Palma de Mallorca, Spain, September 22-25
-
HADELI, H., SCHIERHOLZ, R., BRAENDLE, M., AND TUDUCE, C. Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration. In Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2009, Palma de Mallorca, Spain, September 22-25 (2009), pp. 1–8.
-
(2009)
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2009
, pp. 1-8
-
-
Hadeli, H.1
Schierholz, R.2
Braendle, M.3
Tuduce, C.4
-
22
-
-
84866543673
-
Challenges and opportunities in securing industrial control systems
-
Aachen, Germany, June 11-13
-
HADŽIOSMANOVIĆ, D., BOLZONI, D., ETALLE, S., AND HARTEL, P. H. Challenges and opportunities in securing industrial control systems. In Complexity in Engineering, COMPENG 2012, Aachen, Germany, June 11-13 (2012), pp. 1–6.
-
(2012)
Complexity in Engineering, COMPENG 2012
, pp. 1-6
-
-
Hadžiosmanović, D.1
Bolzoni, D.2
Etalle, S.3
Hartel, P.H.4
-
23
-
-
34547375895
-
Securing the AODV protocol using specification-based intrusion detection
-
Spain, October 2
-
HASSAN, H. M., MAHMOUD, M., AND EL-KASSAS, S. Securing the AODV protocol using specification-based intrusion detection. In Q2SWinet’06 - Proceedings of the Second ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Terromolinos, Spain, October 2 (2006), pp. 33–36.
-
(2006)
Q2SWinet’06 - Proceedings of the Second ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Terromolinos
, pp. 33-36
-
-
Hassan, H.M.1
Mahmoud, M.2
El-Kassas, S.3
-
26
-
-
67649756331
-
Specification-based intrusion detection system for carrier ethernet
-
IT, Barcelona, Spain, March 3-6
-
JIEKE, P., REDOL, J., AND CORREIA, M. Specification-based intrusion detection system for carrier ethernet. In WEBIST 2007 - Proceedings of the Third International Conference on Web Information Systems and Technologies, Volume IT, Barcelona, Spain, March 3-6 (2007), pp. 426–429.
-
(2007)
WEBIST 2007 - Proceedings of the Third International Conference on Web Information Systems and Technologies
, pp. 426-429
-
-
Jieke, P.1
Redol, J.2
Correia, M.3
-
27
-
-
84855845657
-
Specification-based intrusion detection for home area networks in smart grids
-
Brussels, Belgium, October 17-20
-
JOKAR, P., NICANFAR, H., AND LEUNG, V. C. M. Specification-based intrusion detection for home area networks in smart grids. In IEEE Second International Conference on Smart Grid Communications, SmartGridComm 2011, Brussels, Belgium, October 17-20 (2011), pp. 208–213.
-
(2011)
IEEE Second International Conference on Smart Grid Communications, SmartGridComm 2011
, pp. 208-213
-
-
Jokar, P.1
Nicanfar, H.2
Leung, V.C.M.3
-
28
-
-
21644438416
-
Communication systems for building automation and control
-
KASTNER, W., NEUGSCHWANDTNER, G., SOUCEK, S., AND NEWMAN, M. H. Communication systems for building automation and control. Proceedings of the IEEE 93, 6 (2005), 1178–1203.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
, pp. 1178-1203
-
-
Kastner, W.1
Neugschwandtner, G.2
Soucek, S.3
Newman, M.H.4
-
29
-
-
84942694190
-
Securing BACnet’s pitfalls
-
Hamburg, Germany, May 26-28, Proceedings
-
KAUR, J., TONEJC, J., WENDZEL, S., AND MEIER, M. Securing BACnet’s pitfalls. In ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, Proceedings (2015), pp. 616–629.
-
(2015)
ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015
, pp. 616-629
-
-
Kaur, J.1
Tonejc, J.2
Wendzel, S.3
Meier, M.4
-
30
-
-
77958603308
-
The importance, design and implementation of a middleware for networked control systems
-
KIM, K., AND KUMAR, P. R. The importance, design and implementation of a middleware for networked control systems. Springer Lecture Notes in Control and Information Sciences 406, 1 (2010), 1–29.
-
(2010)
Springer Lecture Notes in Control and Information Sciences
, vol.406
, Issue.1
, pp. 1-29
-
-
Kim, K.1
Kumar, P.R.2
-
31
-
-
79960771504
-
Security aspects of the in-vehicle network in the connected car
-
Baden-Baden, Germany, June 5-9
-
KLEBERGER, P., OLOVSSON, T., AND JONSSON, E. Security aspects of the in-vehicle network in the connected car. In IEEE Intelligent Vehicles Symposium (IV), 2011, Baden-Baden, Germany, June 5-9 (2011), pp. 528–533.
-
(2011)
IEEE Intelligent Vehicles Symposium (IV), 2011
, pp. 528-533
-
-
Kleberger, P.1
Olovsson, T.2
Jonsson, E.3
-
32
-
-
80055059379
-
-
KNX ASSOCIATION. KNX Standard, 2011. https://www.knx.org.
-
(2011)
KNX Standard
-
-
-
33
-
-
19544390827
-
System health and intrusion monitoring using a hierarchy of constraints
-
CA, USA, October 10-12, Proceedings
-
KO, C., BRUTCH, P., ROWE, J., TSAFNAT, G., AND LEVITT, K. N. System health and intrusion monitoring using a hierarchy of constraints. In Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, Proceedings (2001), pp. 190–204.
-
(2001)
Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis
, pp. 190-204
-
-
Ko, C.1
Brutch, P.2
Rowe, J.3
Tsafnat, G.4
Levitt, K.N.5
-
34
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
Orlando, FL, USA, 5-9 December
-
KO, C., FINK, G., AND LEVITT, K. N. Automated detection of vulnerabilities in privileged programs by execution monitoring. In 10th Annual Computer Security Applications Conference, ACSAC 1994, Orlando, FL, USA, 5-9 December (1994), pp. 134–144.
-
(1994)
10th Annual Computer Security Applications Conference, ACSAC 1994
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.N.3
-
35
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
Oakland, CA, USA, May 4-7
-
KO, C., RUSCHITZKA, M., AND LEVITT, K. N. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 4-7 (1997), pp. 175–187.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.N.3
-
36
-
-
57749193296
-
An approach to specification-based attack detection for in-vehicle networks
-
Eindhoven, the Netherlands, June 4-6
-
LARSON, U. E., NILSSON, D. K., AND JONSSON, E. An approach to specification-based attack detection for in-vehicle networks. In IEEE Intelligent Vehicles Symposium (IV), 2008, Eindhoven, the Netherlands, June 4-6 (2008), pp. 220–225.
-
(2008)
IEEE Intelligent Vehicles Symposium (IV), 2008
, pp. 220-225
-
-
Larson, U.E.1
Nilsson, D.K.2
Jonsson, E.3
-
37
-
-
84875967976
-
Adapting BRO into SCADA: Building a specification-based intrusion detection system for the DNP3 protocol
-
Oak Ridge, TN, USA, January 8-10
-
LIN, H., SLAGELL, A. J., MARTINO, C. D., KALBARCZYK, Z., AND IYER, R. K. Adapting Bro into SCADA: Building a specification-based intrusion detection system for the DNP3 protocol. In Cyber Security and Information Intelligence, CSIIRW ’13, Oak Ridge, TN, USA, January 8-10 (2013), p. 5.
-
(2013)
Cyber Security and Information Intelligence, CSIIRW ’13
, pp. 5
-
-
Lin, H.1
Slagell, A.J.2
Martino, C.D.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
38
-
-
70350218435
-
Nmap network scanning: The official Nmap project guide to network discovery and security scanning
-
LYON, G. F. Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure, 2009. https://nmap.org/.
-
(2009)
Insecure
-
-
Lyon, G.F.1
-
39
-
-
84890609381
-
-
Tech. rep
-
MANYIKA, J., CHUI, M., BUGHIN, J., DOBBS, R., BISSON, P., AND MARRS, A. Disruptive technologies: Advances that will transform life, business, and the global economy. Tech. rep., 2013.
-
(2013)
Disruptive Technologies: Advances That Will Transform Life, Business, and the Global Economy
-
-
Manyika, J.1
Chui, M.2
Bughin, J.3
Dobbs, R.4
Bisson, P.5
Marrs, A.6
-
42
-
-
85067814868
-
-
NATIONAL JOINT APPRENTICESHIP & TECHNICAL COMMITTEE. American Technical Publishers, Inc
-
NATIONAL JOINT APPRENTICESHIP & TECHNICAL COMMITTEE. Building Automation: Control Devices and Applications. American Technical Publishers, Inc., 2008.
-
(2008)
Building Automation: Control Devices and Applications
-
-
-
44
-
-
33646178576
-
An EFSMbased intrusion detection system for ad hoc networks
-
Taipei, Taiwan, October 4-7, Proceedings
-
ORSET, J., ALCALDE, B., AND CAVALLI, A. R. An EFSMbased intrusion detection system for ad hoc networks. In Automated Technology for Verification and Analysis, Third International Symposium, ATVA 2005, Taipei, Taiwan, October 4-7, Proceedings (2005), pp. 400–413.
-
(2005)
Automated Technology for Verification and Analysis, Third International Symposium, ATVA 2005
, pp. 400-413
-
-
Orset, J.1
Alcalde, B.2
Cavalli, A.R.3
-
45
-
-
84940859071
-
Anomaly based intrusion detection for building automation and control networks
-
Doha, Qatar, November 10-13
-
PAN, Z., HARIRI, S., AND AL-NASHIF, Y. B. Anomaly based intrusion detection for building automation and control networks. In 11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014, Doha, Qatar, November 10-13 (2014), pp. 72–77.
-
(2014)
11th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2014
, pp. 72-77
-
-
Pan, Z.1
Hariri, S.2
Al-Nashif, Y.B.3
-
46
-
-
85084164413
-
BrO: A system for detecting network intruders in real-time
-
San Antonio, TX, USA, January 26-29
-
PAXSON, V. Bro: A system for detecting network intruders in real-time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 26-29 (1998).
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Paxson, V.1
-
48
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Vancouver, BC, Canada, July 31 August 4
-
PETRONI, N. L., FRASER, T., WALTERS, A., AND ARBAUGH, W. A. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4 (2006).
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Petroni, N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
50
-
-
70349331074
-
Terminology extraction from log files
-
Linz, Austria, August 31 September 4, Proceedings
-
SANEIFAR, H., BONNIOL, S., LAURENT, A., PONCELET, P., AND ROCHE, M. Terminology extraction from log files. In Database and Expert Systems Applications, 20th International Conference, DEXA 2009, Linz, Austria, August 31 - September 4, Proceedings (2009), pp. 769–776.
-
(2009)
Database and Expert Systems Applications, 20th International Conference, DEXA 2009
, pp. 769-776
-
-
Saneifar, H.1
Bonniol, S.2
Laurent, A.3
Poncelet, P.4
Roche, M.5
-
51
-
-
0033397980
-
Python: A programming language for software integration and development
-
SANNER, M. F. Python: a programming language for software integration and development. J Mol Graph Model 17, 1 (1999), 57–61. https://www.python.org/.
-
(1999)
J Mol Graph Model
, vol.17
, Issue.1
, pp. 57-61
-
-
Sanner, M.F.1
-
52
-
-
33748869821
-
A specification-based approach for building survivable systems
-
SEKAR, R., CAI, Y., AND SEGAL, M. A specification-based approach for building survivable systems. In Proceedings of the National Information Systems Security Conference (NISSC’98) (1998), pp. 338–347.
-
(1998)
Proceedings of the National Information Systems Security Conference (NISSC’98)
, pp. 338-347
-
-
Sekar, R.1
Cai, Y.2
Segal, M.3
-
53
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
Washington, DC, USA, November 18-22
-
SEKAR, R., GUPTA, A. K., FRULLO, J., SHANBHAG, T., TIWARI, A., YANG, H., AND ZHOU, S. Specification-based anomaly detection: A new approach for detecting network intrusions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22 (2002), pp. 265–274.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.K.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
54
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
Washington, D.C., August 23-26
-
SEKAR, R., AND UPPULURI, P. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23-26 (1999).
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
55
-
-
85050342606
-
SPICY: A unified deep packet inspection framework dissecting all your data
-
TR-15-004
-
SOMMER, R., AMANN, J., AND HALL, S. Spicy: A unified deep packet inspection framework dissecting all your data. Tech. rep., ICSI, 2015. TR-15-004.
-
(2015)
Tech. Rep., ICSI
-
-
Sommer, R.1
Amann, J.2
Hall, S.3
-
56
-
-
33745673835
-
Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks
-
Newcastle upon Tyne, UK, July 18-19, Revised Selected Papers
-
SONG, T., KO, C., TSENG, C. H., BALASUBRAMANYAM, P., CHAUDHARY, A., AND LEVITT, K. N. Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks. In Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, Revised Selected Papers (2005), pp. 16–33.
-
(2005)
Formal Aspects in Security and Trust, Third International Workshop, FAST 2005
, pp. 16-33
-
-
Song, T.1
Ko, C.2
Tseng, C.H.3
Balasubramanyam, P.4
Chaudhary, A.5
Levitt, K.N.6
-
57
-
-
0029307559
-
Natural language information retrieval
-
STRZALKOWSKI, T. Natural language information retrieval. Inf. Process. Manage. 31, 3 (1995), 397–417.
-
(1995)
Inf. Process. Manage.
, vol.31
, Issue.3
, pp. 397-417
-
-
Strzalkowski, T.1
-
58
-
-
84922334207
-
Towards suppressing attacks on and improving resilience of building automation systems - An approach exemplified using BACnet
-
21. März 2014, Wien, Österreich
-
SZLÓSARCZYK, S., WENDZEL, S., KAUR, J., MEIER, M., AND SCHUBERT, F. Towards suppressing attacks on and improving resilience of building automation systems - an approach exemplified using BACnet. In Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich (2014), pp. 407–418.
-
(2014)
Sicherheit 2014: Sicherheit, Schutz Und Zuverlässigkeit, Beiträge Der 7. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik E.V. (GI)
, vol.19
, pp. 407-418
-
-
Szlósarczyk, S.1
Wendzel, S.2
Kaur, J.3
Meier, M.4
Schubert, F.5
-
59
-
-
33846980793
-
Specification-based intrusion detection for H.323-based voice over IP
-
Athens, Greece, December 18-21
-
TRUONG, P., NIEH, D., AND MOH, M. Specification-based intrusion detection for H.323-based voice over IP. In Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2005), Athens, Greece, December 18-21 (2005), pp. 387–392.
-
(2005)
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2005)
, pp. 387-392
-
-
Truong, P.1
Nieh, D.2
Moh, M.3
-
60
-
-
4544342574
-
A specification-based intrusion detection system for AODV
-
Fairfax, Virginia, USA
-
TSENG, C., BALASUBRAMANYAM, P., KO, C., LIMPRASITTIPORN, R., ROWE, J., AND LEVITT, K. N. A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA (2003), pp. 125–134.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003
, pp. 125-134
-
-
Tseng, C.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.N.6
-
61
-
-
33745657261
-
A specification-based intrusion detection model for OLSR
-
Seattle, WA, USA, September 7-9, Revised Papers
-
TSENG, C. H., SONG, T., BALASUBRAMANYAM, P., KO, C., AND LEVITT, K. N. A specification-based intrusion detection model for OLSR. In Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, Revised Papers (2005), pp. 330–350.
-
(2005)
Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005
, pp. 330-350
-
-
Tseng, C.H.1
Song, T.2
Balasubramanyam, P.3
Ko, C.4
Levitt, K.N.5
-
62
-
-
2942751146
-
Experiences with specification-based intrusion detection
-
CA, USA, October 10-12, Proceedings
-
UPPULURI, P., AND SEKAR, R. Experiences with specification-based intrusion detection. In Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, Proceedings (2001), pp. 172–189.
-
(2001)
Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
63
-
-
84875524762
-
Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet
-
Besancon, France, November 20-23
-
WENDZEL, S., KAHLER, B., AND RIST, T. Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France, November 20-23 (2012), pp. 731–736.
-
(2012)
2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, GreenCom/iThings/CPSCom 2012
, pp. 731-736
-
-
Wendzel, S.1
Kahler, B.2
Rist, T.3
|