-
1
-
-
0003160094
-
Algorithms for finding patterns in strings
-
Elsevier Science Publishers B.
-
A . V . Aho, Algorithms for Finding Patterns in Strings, Handbook of Theoretical Computer Science Vol A, Elsevier Science Publishers B.V., 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.A
-
-
Aho, A.V.1
-
2
-
-
0004053148
-
-
Addison-Wesley, Reading, MA
-
A.V. Aho, B.W. Kernighan, and P.J. Weinberger, The AWK Programming Language, Addison-Wesley, Reading, MA, 1988.
-
(1988)
The AWK Programming Language
-
-
Aho, A.V.1
Kernighan, B.W.2
Weinberger, P.J.3
-
3
-
-
0003964874
-
-
SRI-CSL-95-07, SRI International
-
D . Anderson, T . Lunt, H . Javitz, A . D. Anderson, T. Lunt, H. Javitz, A. Tamaru, and A. Valdes, Next-generation In¬trusion Detection Expert System (NIDES): A Summary, SRI-CSL-95-07, SRI International, 1995..
-
(1995)
Next-Generation In¬Trusion Detection Expert System (NIDES): A Summary
-
-
Anderson, D.1
Lunt, T.2
Javitz, H.3
Anderson, A.D.4
Lunt, T.5
Javitz, H.6
Tamaru, A.7
Valdes, A.8
-
4
-
-
3843053682
-
-
Technical Report 647, INRIA, Paris
-
G. Berry, P. Couronne and G. Gonthier, Synchronous Programming of Reactive Systems: An Introduction to Esterel, Technical Report 647, INRIA, Paris, 1987.
-
(1987)
Synchronous Programming of Reactive Systems: An Introduction to Esterel
-
-
Berry, G.1
Couronne, P.2
Gonthier, G.3
-
5
-
-
0030092390
-
Checking for Race Con¬ditions in File Access
-
M. Bishop, M. Dilger, Checking for Race Con¬ditions in File Access. Computing Systems 9(2), 1996, pp. 131-152.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
9
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle and Q. Zhang, StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, 7th USENIX Security Sym¬posium, 1998..
-
(1998)
7th USENIX Security Sym¬Posium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Cowan, J.C.4
Pu, C.5
Maier, D.6
Walpole, J.7
Bakke, P.8
Beattie, S.9
Grier, A.10
Wagle, P.11
Zhang, Q.12
-
12
-
-
85077740509
-
A neural network approach towards intrusion detection
-
K. Fox, R. Henning, J. Reed and R. Simo-nian, A Neural Network Approach Towards Intrusion Detection, National Computer Secu¬rity Conference, 1990I n t r u s i o n D e t e c t i o n, N a t i o n a l C o m p u t e r Secur i t y Conference, 1990.
-
(1990)
National Computer Secu¬Rity Conference, 1990I N T R U S I O N D E T E C T I O N, N A T I O N A L C O M P U T E R Secur I T Y Conference
-
-
Fox, K.1
Henning, R.2
Reed, J.3
Simo-Nian, R.4
-
14
-
-
0003246945
-
SLIC: An extensibility system for commodity operating systems
-
D. Ghormley, D. Petrou, S. Rodrigues, and D. Ghormley, D. Petrou, S. Rodrigues, and T. Anderson, SLIC: An Extensibility System for Commodity Operating Systems, USENIX Annual Technical Conference, 1998.
-
(1998)
USENIX Annual Technical Conference
-
-
Ghormley, D.1
Petrou, D.2
Rodrigues, S.3
Ghormley, D.4
Petrou, D.5
Rodrigues, S.6
Anderson, T.7
-
15
-
-
0029755480
-
Network security via reverse engineering of TCP code: Vulner¬ability Analysis and Proposed Solutions
-
March
-
B. Guha and B. Mukherjee, Network Security via Reverse Engineering of TCP Code: Vulner¬ability Analysis and Proposed Solutions, Proc. of the IEEE Infocom, March 1996.
-
(1996)
Proc. Of the IEEE Infocom
-
-
Guha, B.1
Mukherjee, B.2
-
17
-
-
85084162735
-
A secure environment for untrusted helper applications
-
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer, A Secure Environment for Untrusted Helper Applications, USENIX Security Symposium, 1996.
-
(1996)
USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.4
-
18
-
-
0018005391
-
Communicating Sequential Pro¬cesses
-
C. Hoare, Communicating Sequential Pro¬cesses, Comm. of the ACM, 21(8), 1978.
-
(1978)
Comm. Of the ACM
, vol.21
, Issue.8
-
-
Hoare, C.1
-
19
-
-
0027808377
-
Interposition agents: Transparently interposing user code at the system interface
-
December
-
M. Jones, Interposition Agents: Transparently Interposing User Code at the System Interface, 14th ACM Symposium on Operating Systems Principles, December 1993
-
(1993)
14th ACM Symposium on Operating Systems Principles
-
-
Jones, M.1
-
21
-
-
85077756877
-
-
Ph.D Dissertation, De¬partment of Computer Science, Purdue Uni¬versity
-
S . Kumar, Classification and Detection of S. Kumar, Classification and Detection of Computer Intrusions, Ph.D Dissertation, De¬partment of Computer Science, Purdue Uni¬versity, 1995..
-
(1995)
Classification and Detection of S. Kumar, Classification and Detection of Computer Intrusions
-
-
Kumar, S.1
-
22
-
-
85077740256
-
-
Princeton University Press, Princeton, NJ
-
R. Kurshan, Computer Aided Verification R. Kurshan, Computer Aided Verification of Coordinating Processes: The Automata-Theoretic Approach, Princeton University Press, Princeton, NJ, 1994.
-
(1994)
Computer Aided Verification R. Kurshan, Computer Aided Verification of Coordinating Processes: The Automata-Theoretic Approach
-
-
Kurshan, R.1
-
23
-
-
0029488806
-
MCF: A malicious code filter
-
R.W. Lo, K.N. Levitt, R.A. Olsson, MCF: a Malicious Code Filter, Computers and Secu¬rity, Vol.14, No.6, 1995..
-
(1995)
Computers and Secu¬Rity
, vol.14
, Issue.6
-
-
Lo, R.W.1
Levitt, K.N.2
Olsson, R.A.3
-
25
-
-
85077756835
-
Task Sequencing Language for Specifying Distributed Ada Sys¬tems: TSL-1
-
D. Luckham, D. Helmbold, S. Meldal, D. D. Luckham, D. Helmbold, S. Meldal, D. Bryan, and M. Haberler, Task Sequencing Language for Specifying Distributed Ada Sys¬tems: TSL-1, PARLE: Conf. on Parallel Archi¬tectures and Languages, LNCS 259-2, 1987.
-
(1987)
PARLE: Conf. On Parallel Archi¬Tectures and Languages
, pp. 259-262
-
-
Luckham, D.1
Helmbold, D.2
Meldal, S.3
Luckham, D.D.4
Helmbold, D.5
Meldal, S.6
Bryan, D.7
Haberler, M.8
-
27
-
-
84939030805
-
Regular ex¬pressions and state graphs for automata
-
R. McNaughton and H. Yamada, Regular ex¬pressions and state graphs for automata, IRE Trans, on Electronic Comput., EC-9(1), 1960..
-
(1960)
IRE Trans, on Electronic Comput
, vol.EC-9
, Issue.1
-
-
McNaughton, R.1
Yamada, H.2
-
29
-
-
0025401691
-
CECIL: A Se¬quencing Constraint Language for Automatic Static Analysis Generation
-
K. Ölender and L. Osterweil, Cecil: A Se¬quencing Constraint Language for Automatic Static Analysis Generation, IEEE Transac¬tions on Software Engineering, 16(3), 1990.
-
(1990)
IEEE Transac¬Tions on Software Engineering
, vol.16
, Issue.3
-
-
Ölender, K.1
Osterweil, L.2
-
31
-
-
0003970441
-
-
TR 98-1664, Department of Computer Science, Cornell University, Ithaca, N Y
-
F. Schneider, Enforceable Security Policies, TR 98-1664, Department of Computer Science, Cornell University, Ithaca, N Y, 1998.
-
(1998)
Enforceable Security Policies
-
-
Schneider, F.1
-
34
-
-
35248873956
-
-
Technical Report 99-03, Department of Computer Science, Iowa State University, Ames, IA 50014
-
R. Sekar and P. Uppuluri, Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications, Technical Report 99-03, Department of Computer Science, Iowa State University, Ames, IA 50014.
-
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
-
-
Sekar, R.1
Uppuluri, P.2
|