Information Technology Reference
In-Depth Information
7. Gorodetski, V., Kotenko, I.: Attacks against Computer Network: Formal Grammar-based
Framework and Simulation Tool. In:
Lecture Notes in Computer Science
, V.2516.
Recent
Advances in Intrusion Detection. Fifth International Symposium. RAID 2002.
Zurich, Swit-
zerland (2002)
8. Howard, J.D., Longstaff, T.A.:
A Common Language for Computer Security Incidents,
SANDIA REPORT, SAND98-8667 (1998)
9. Householder, A., Houle, K., Dougherty, C.: Computer Attack Trends Challenge Internet
Security.
IEEE Security & Privacy magazine, New Challenges, New Thinking
. April (2002)
10. Kemmerer, R.A., Vigna, G.: NetSTAT: A network-based intrusion detection approach. In:
Proceedings of the 14th Annual Computer Security Applications Conference
, Scottsdale,
Arizona (1998)
11. Kotenko, I.: Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Dis-
tributed Attacks on Computer Networks. In:
The 3rd International/Central and Eastern
European Conference on Multi-Agent Systems (CEEMAS 2003)
. The Czech Republic
(2003)
12. Kumar, S., Spafford, E.H.:
An Application of Pattern Matching in Intrusion Detection.
Technical Report CSDTR 94 013
. Purdue University. West Lafayette (1994)
13. Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line in-
trusion detection evaluation. In:
Lecture Notes in Computer Science
, Vol.1907, RAID'2000
(2000)
14. Moitra, S.D., Konda, S.L.:
A Simulation Model for Managing Survivability of Networked
Information Systems
, Technical Report CMU/SEI-2000-TR-020 ESC-TR-2000-020 (2000)
15. Moore, A.P., Ellison, R.J., Linger, R.C.:
Attack Modeling for Information Security and Sur-
vivability
. Technical Note CMU/SEI-2001-TN-001. Survivable Systems (2001)
16. Ritchey, R. W., Ammann, P.: Using model checking to analyze network vulnerabilities. In:
Proceedings of IEEE Computer Society Symposium on Security and Privacy
(2000)
17. Schneier, B.: Attack Trees: Modeling Security Threats. In:
Dr. Dobb's Journal
, December
(1999)
18. Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and
analysis of attack graphs. In:
Proceedings of the IEEE Computer Society Symposium on Se-
curity and Privacy
(2002)
19. Stewart, A.J.: Distributed Metastasis: A Computer Network Penetration Methodology. In:
Phrack Magazine
, Vol 9, Issue 55 (1999)
20. Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In:
Proceedings DISCEX '01
(2001)
21. Templeton, S. J., Levitt, K.:A Requires/Provides Model for Computer Attacks. In:
Pro-
ceedings of the New Security Paradigms Workshop
(2000)
22. Vigna, G., Eckmann, S.T., Kemmerer, R.A.: Attack Languages. In:
Proceedings of the
IEEE Information Survivability Workshop
, Boston (2000)
23. Yuill, J., Wu, F., Settle, J., Gong, F., Forno, R., Huang, M., Asbery, J.: Intrusion-detection
for incident-response, using a military battlefield-intelligence process. In:
Computer Net-
works
, No.34 (2000)