Privacy-Preserving Sharing and Correlation of Security Alerts
暂无分享,去创建一个
[1] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[2] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[3] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[7] Markus Peuhkuri. A method to compress and anonymize packet traces , 2001, IMW '01.
[8] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[9] R. Dingledine,et al. Reputation in P2P Anonymity Systems , 2003 .
[10] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[11] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[12] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[13] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[14] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[15] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[16] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[17] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[18] Vern Paxson,et al. A high-level programming environment for packet trace anonymization and transformation , 2003, SIGCOMM '03.
[19] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[20] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[21] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[22] Mostafa H. Ammar,et al. On the design and performance of prefix-preserving IP traffic trace anonymization , 2001, IMW '01.
[23] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[24] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[25] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[26] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[27] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.