-
1
-
-
0004048154
-
-
Technical report, James P Anderson Co., Fort Washington, PA, USA, April
-
J. Anderson, "Computer security threat monitoring and surveillance," Technical report, James P Anderson Co., Fort Washington, PA, USA, April 1980.
-
(1980)
Computer Security Threat Monitoring and Surveillance
-
-
Anderson, J.1
-
2
-
-
0003539116
-
Snort-Lightweight Intrusion Detection For Networks
-
November
-
M. Roesch, "Snort-lightweight intrusion detection for networks," Proceedings of the USENIX 13th System Administrations Conference, LISA '99, Seattle, Washington, USA, November 1999.
-
(1999)
Proceedings Of The Usenix 13Th System Administrations Conference, Lisa '99, Seattle, Washington, Usa
-
-
Roesch, M.1
-
4
-
-
85133874526
-
-
accessed in January
-
Snort Users Manual, http://snort.org/. (accessed in January 2005).
-
(2005)
Snort Users Manual
-
-
-
5
-
-
30144438212
-
-
MIT Lincoln Laboratory, accessed in December
-
MIT Lincoln Laboratory, DARPA intrusion detection data sets, http://www.ll.mit.edu/IST/ideval/data/data-index.html. (accessed in December 2005).
-
(2005)
DARPA Intrusion Detection Data Sets
-
-
-
6
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S. Eckmann, G. Vigna, and R. Kemmerer, "STATL: An attack language for state-based intrusion detection," Journal of Computer Security, 10:71-104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
7
-
-
0033295259
-
Bro: a system for detecting network intruders in real-time
-
V. Paxson, "Bro: a system for detecting network intruders in real-time," Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
8
-
-
33750267521
-
-
accessed in December
-
The abstract state machine language, http://research.microsoft.com/fse/asml/. (accessed in December 2005).
-
(2005)
The Abstract State Machine Language
-
-
-
11
-
-
37149050856
-
Scenario-oriented modeling in AsmL and its instrumentation for testing
-
May
-
M. Barnett, W. Grieskamp, Y. Gurevich, W. Schulte, N. Tillmann, and M. Veanes, "Scenario-oriented modeling in AsmL and its instrumentation for testing," In Proc. of the 2nd Intl. Workshop on Scenarios and State Machine Models, Algorithms, and Tools, Oregon, USA, May 2003.
-
(2003)
Proc. of the 2nd Intl. Workshop on Scenarios and State Machine Models, Algorithms, and Tools, Oregon, USA
-
-
Barnett, M.1
Grieskamp, W.2
Gurevich, Y.3
Schulte, W.4
Tillmann, N.5
Veanes, M.6
-
12
-
-
33644932227
-
-
Technical report, Microsoft Research, Redmond, WA, USA
-
M. Barnett, W. Grieskamp, L. Nachmanson, W. Schulte, N. Tillmann, and M. Veanes, "Model-based testing with Asml.NET," Technical report, Microsoft Research, Redmond, WA, USA, 2003.
-
(2003)
Model-based testing with Asml.NET
-
-
Barnett, M.1
Grieskamp, W.2
Nachmanson, L.3
Schulte, W.4
Tillmann, N.5
Veanes, M.6
-
13
-
-
36949017943
-
Testable use cases in the abstract state machine language
-
Hong Kong
-
W. Grieskamp, M. Lepper, W. Schulte, and N. Tillmann, "Testable use cases in the abstract state machine language," In Proc. of Asia-Pacific Conference on Quality Software, pp. 167-172, Hong Kong, 2001.
-
(2001)
Proc. of Asia-Pacific Conference on Quality Software
, pp. 167-172
-
-
Grieskamp, W.1
Lepper, M.2
Schulte, W.3
Tillmann, N.4
-
15
-
-
33846312311
-
Efficient context-sensitive intrusion detection
-
February
-
J. Giffin, S. Jha, and B. Miller, "Efficient context-sensitive intrusion detection," In 11th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego, California, February 2004.
-
(2004)
11th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego, California
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
16
-
-
34548137832
-
Context-based intrusion detection using Snort
-
St. Andrews, New Brunswick, Canada, Oct
-
F. Massicotte, M. Couture, and Y. Labiche, "Context-based intrusion detection using Snort," In Third Annual Conference on Privacy, Security and Trust, pp. 53-61, St. Andrews, New Brunswick, Canada, Oct. 2005.
-
(2005)
Third Annual Conference on Privacy, Security and Trust
, pp. 53-61
-
-
Massicotte, F.1
Couture, M.2
Labiche, Y.3
|