Safeguarding Critical Infrastructures

A team of recognized experts leads the way to dependable computing systems. With computers and networks pervading every aspect of daily life, there is an ever growing demand for dependability. In t ...

[1]  Simin Nadjm-Tehrani,et al.  Alarm reduction and correlation in defence of IP networks , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[2]  David Heckerman,et al.  A Tutorial on Learning with Bayesian Networks , 1998, Learning in Graphical Models.

[3]  Stefanos Manganaris,et al.  A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.

[4]  Simin Nadjm-Tehrani,et al.  Scale-up and performance studies of three agent platforms , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[5]  Ning Lu,et al.  Safeguarding SCADA Systems with Anomaly Detection , 2003, MMM-ACNS.

[6]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  Simin Nadjm-Tehrani,et al.  Time as a Metric for Defence in Survivable Networks , 2003 .

[8]  Simin Nadjm-Tehrani,et al.  ADWICE - Anomaly Detection with Real-Time Incremental Clustering , 2004, ICISC.

[9]  R. Sekar,et al.  Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.

[10]  Roch Guérin,et al.  Implementation and performance measurements of QoS routing extensions to OSPF , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[11]  Stefan Savage,et al.  The Spread of the Sapphire/Slammer Worm , 2003 .

[12]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[13]  Vinod Yegneswaran,et al.  Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.

[14]  John McHugh,et al.  Intrusion and intrusion detection , 2001, International Journal of Information Security.