Information Technology Reference
In-Depth Information
7. Gorodetski, V., Kotenko, I.: Attacks against Computer Network: Formal Grammar-based
Framework and Simulation Tool. In: Lecture Notes in Computer Science , V.2516. Recent
Advances in Intrusion Detection. Fifth International Symposium. RAID 2002. Zurich, Swit-
zerland (2002)
8. Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents,
SANDIA REPORT, SAND98-8667 (1998)
9. Householder, A., Houle, K., Dougherty, C.: Computer Attack Trends Challenge Internet
Security. IEEE Security & Privacy magazine, New Challenges, New Thinking . April (2002)
10. Kemmerer, R.A., Vigna, G.: NetSTAT: A network-based intrusion detection approach. In:
Proceedings of the 14th Annual Computer Security Applications Conference , Scottsdale,
Arizona (1998)
11. Kotenko, I.: Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Dis-
tributed Attacks on Computer Networks. In: The 3rd International/Central and Eastern
European Conference on Multi-Agent Systems (CEEMAS 2003) . The Czech Republic
(2003)
12. Kumar, S., Spafford, E.H.: An Application of Pattern Matching in Intrusion Detection.
Technical Report CSDTR 94 013 . Purdue University. West Lafayette (1994)
13. Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line in-
trusion detection evaluation. In: Lecture Notes in Computer Science , Vol.1907, RAID'2000
(2000)
14. Moitra, S.D., Konda, S.L.: A Simulation Model for Managing Survivability of Networked
Information Systems , Technical Report CMU/SEI-2000-TR-020 ESC-TR-2000-020 (2000)
15. Moore, A.P., Ellison, R.J., Linger, R.C.: Attack Modeling for Information Security and Sur-
vivability . Technical Note CMU/SEI-2001-TN-001. Survivable Systems (2001)
16. Ritchey, R. W., Ammann, P.: Using model checking to analyze network vulnerabilities. In:
Proceedings of IEEE Computer Society Symposium on Security and Privacy (2000)
17. Schneier, B.: Attack Trees: Modeling Security Threats. In: Dr. Dobb's Journal , December
(1999)
18. Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and
analysis of attack graphs. In: Proceedings of the IEEE Computer Society Symposium on Se-
curity and Privacy (2002)
19. Stewart, A.J.: Distributed Metastasis: A Computer Network Penetration Methodology. In:
Phrack Magazine , Vol 9, Issue 55 (1999)
20. Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In:
Proceedings DISCEX '01 (2001)
21. Templeton, S. J., Levitt, K.:A Requires/Provides Model for Computer Attacks. In: Pro-
ceedings of the New Security Paradigms Workshop (2000)
22. Vigna, G., Eckmann, S.T., Kemmerer, R.A.: Attack Languages. In: Proceedings of the
IEEE Information Survivability Workshop , Boston (2000)
23. Yuill, J., Wu, F., Settle, J., Gong, F., Forno, R., Huang, M., Asbery, J.: Intrusion-detection
for incident-response, using a military battlefield-intelligence process. In: Computer Net-
works , No.34 (2000)
Search WWH ::




Custom Search