Learning unknown attacks - a start
暂无分享,去创建一个
James C. Reynolds | J. C. Reynolds | J. Rowe | R. Maglich | K. Levitt | J. Rowe | J. Just | L. Clough | M. Danforth | R. Maglich | J.E. Just | J.C. Reynolds | L.A. Clough | M. Danforth | K.N. Levitt | Melissa Danforth | J. Reynolds
[1] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[2] Karl N. Levitt,et al. The design and implementation of an intrusion tolerant system , 2002, Proceedings International Conference on Dependable Systems and Networks.
[3] Wenliang Du,et al. Categorization of Software Errors that led to Security Breaches , 1998 .
[4] Craig A. N. Soules,et al. Self-securing storage: protecting data in compromised systems , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[5] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[6] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[7] R. M. Balzer,et al. Mediating connectors , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems. Workshops on Electronic Commerce and Web-based Applications. Middleware.
[8] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .
[9] Calvin Ko,et al. Logic induction of valid behavior specifications for intrusion detection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[11] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[12] Craig A. N. Soules,et al. Survivable storage systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[13] Butler W. Lampson,et al. 31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .
[14] James A. Davis,et al. The development of a database taxonomy of vulnerabilities to support the study of denial of service attacks , 2001 .
[15] Karl N. Levitt,et al. System Health and Intrusion Monitoring Using a Hierarchy of Constraints , 2001, Recent Advances in Intrusion Detection.