A Computer Network Attack Taxonomy and Ontology
暂无分享,去创建一个
Louise Leenen | Renier van Heerden | Barry Irwin | Ivan D. Burke | B. Irwin | L. Leenen | I. Burke | R. V. Heerden
[1] Minjie Zhang,et al. P2P Distributed Intrusion Detections by Using Mobile Agents , 2008, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008).
[2] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[3] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[4] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[5] Ruby B. Lee,et al. Remote Denial of Service Attacks and Countermeasures , 2001 .
[6] Raphael Mudge. Live-fire security testing with Armitage and Metasploit , 2011 .
[7] Ruby B. Lee,et al. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.
[8] Heloise Pieterse,et al. Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model , 2012, HCC.
[9] Lisa Lancor,et al. Using google hacking to enhance defense strategies , 2007, SIGCSE '07.
[10] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Susan W. Brenner,et al. State-Sponsored Crime: The Futility of the Economic Espionage Act , 2006 .
[12] Andrew James Simmonds,et al. An Ontology for Network Security Attacks , 2004, AACC.
[13] Jack Valentin,et al. News of the world , 2000 .
[14] Kim-Kwang Raymond Choo. Organised crime groups in cyberspace: a typology , 2008 .
[15] N. F. Noy,et al. Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .
[16] Raducanu Razvan. Over the SQL injection hacking method , 2009, ICC 2009.
[17] Steven Furnell,et al. Insider Threat Prediction Tool: Evaluating the probability of IT misuse , 2002, Comput. Secur..
[18] Timothy W. Finin,et al. A Target-Centric Ontology for Intrusion Detection , 2003, IJCAI 2003.
[19] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[20] M. Mignone,et al. THE FOX AND THE HUNTERS: HOW IC TECHNOLOGIES CHANGE THE CRIME RACE* , 2002 .
[21] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[22] James A. Lewis. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats , 2002 .
[23] David R. Cheriton,et al. Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks , 2003, ArXiv.
[24] Robin A. Gandhi,et al. Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political , 2011, IEEE Technology and Society Magazine.
[25] Mark Rounds,et al. Diversity in Network Attacker Motivation: A Literature Review , 2009, 2009 International Conference on Computational Science and Engineering.
[26] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[27] Jan H. P. Eloff,et al. Simulating adversarial interactions between intruders and system administrators using OODA-RR , 2007, SAICSIT '07.
[28] Nicholas H. Brummell,et al. Dynamo efficiency in compressible convective dynamos with and without penetration , 2010 .
[29] Simon Luke Hansman,et al. A Taxonomy of Network and Computer Attack Methodologies , 2003 .