Volume 10,
Number 1/2,
2002
Intrusion Detection
- Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok:
Toward Cost-Sensitive Modeling for Intrusion Detection and Response.
5-22
- Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni:
Using Internal Sensors and Embedded Detectors for Intrusion Detection.
23-70
- Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection.
71-104
- Stuart Staniford, James A. Hoagland, Joseph M. McAlerney:
Practical Automated Detection of Stealthy Portscans.
105-136
- Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia:
Enhancing Profiles for Anomaly Detection Using Time Granularities.
137-158
- Diomidis Spinellis, Dimitris Gritzalis:
Panoptis: Intrusion Detection Using a Domain-Specific Language.
159-176
- Alec Yasinsac:
An Environment for Security Protocol Intrusion Detection.
177-188
- C. R. Ramakrishnan, R. C. Sekar:
Model-Based Analysis of Configuration Vulnerabilities.
189-209
Volume 10,
Number 3,
2002
CCS 2000
Volume 10,
Number 4,
2002
ESORICS 2000
- Gerald Brose:
Manageable Access Control for CORBA.
301-338
- Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll:
Verified Formal Security Models for Multiapplicative Smart Cards.
339-368
- Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon:
Checking Secure Interactions of Smart Card Applets: Extended Version.
369-398
- Ian Welch, Robert J. Stroud:
Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code.
399-432
Copyright © Fri Mar 12 17:29:53 2010
by Michael Ley (ley@uni-trier.de)