Volume 10,
Number 1/2,
2002
Intrusion Detection
- Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok:
Toward Cost-Sensitive Modeling for Intrusion Detection and Response.
5-22 BibTeX
- Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni:
Using Internal Sensors and Embedded Detectors for Intrusion Detection.
23-70 BibTeX
- Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection.
71-104 BibTeX
- Stuart Staniford, James A. Hoagland, Joseph M. McAlerney:
Practical Automated Detection of Stealthy Portscans.
105-136 BibTeX
- Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia:
Enhancing Profiles for Anomaly Detection Using Time Granularities.
137-158 BibTeX
- Diomidis Spinellis, Dimitris Gritzalis:
Panoptis: Intrusion Detection Using a Domain-Specific Language.
159-176 BibTeX
- Alec Yasinsac:
An Environment for Security Protocol Intrusion Detection.
177-188 BibTeX
- C. R. Ramakrishnan, R. C. Sekar:
Model-Based Analysis of Configuration Vulnerabilities.
189-209 BibTeX
Volume 10,
Number 3,
2002
CCS 2000
Volume 10,
Number 4,
2002
ESORICS 2000
- Gerald Brose:
Manageable Access Control for CORBA.
301-338 BibTeX
- Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll:
Verified Formal Security Models for Multiapplicative Smart Cards.
339-368 BibTeX
- Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon:
Checking Secure Interactions of Smart Card Applets: Extended Version.
369-398 BibTeX
- Ian Welch, Robert J. Stroud:
Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code.
399-432 BibTeX
Copyright © Sun May 17 00:07:59 2009
by Michael Ley (ley@uni-trier.de)