Attack scenario construction with a new sequential mining technique
暂无分享,去创建一个
Li Dong | Wang Li | Li Zhitang | Lei Jie
[1] Tsuyoshi Takagi,et al. Some Analysis of Radix-r Representations , 2005, IACR Cryptol. ePrint Arch..
[2] Peng Ning,et al. Alert correlation through triggering events and common resources , 2004, 20th Annual Computer Security Applications Conference.
[3] Nigel P. Smart,et al. Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three , 2003, Applicable Algebra in Engineering, Communication and Computing.
[4] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[5] Janak H. Patel. Performance of Processor-Memory Interconnections for Multiprocessors , 1981, IEEE Transactions on Computers.
[6] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[7] Marc Joye,et al. Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity , 2004, IEEE Transactions on Computers.
[8] Dharma P. Agrawal,et al. A Survey and Comparision of Fault-Tolerant Multistage Interconnection Networks , 1987, Computer.
[9] Nigel P. Smart,et al. Hardware Implementation of Finite Fields of Characteristic Three , 2002, CHES.
[10] Xinzhou Qin,et al. A Probabilistic-Based Framework for INFOSEC Alert Correlation , 2005 .
[11] Wenke Lee,et al. Discovering Novel Attack Strategies from INFOSEC Alerts , 2004, ESORICS.
[12] Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.
[13] Nicolas Thériault,et al. SPA Resistant Left-to-Right Integer Recodings , 2005, IACR Cryptol. ePrint Arch..
[14] Bodo Möller,et al. Securing Elliptic Curve Point Multiplication against Side-Channel Attacks , 2001, ISC.
[15] John Paul Shen. Fault tolerance analysis of several interconnection networks , 1982, ICPP.
[16] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[17] Sudhakar M. Reddy,et al. Augmented Shuffle-Exchange Multistage Interconnection Networks , 1987, Computer.
[18] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[19] Tsuyoshi Takagi,et al. Radix-r Non-Adjacent Form , 2004, ISC.
[20] Tse-yun Feng,et al. A Survey of Interconnection Networks , 1981, Computer.
[21] Howard Jay Siegel,et al. The Extra Stage Cube: A Fault-Tolerant Interconnection Network for Supersystems , 1982, IEEE Transactions on Computers.
[22] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[23] Ian F. Blake,et al. Advances in Elliptic Curve Cryptography: Frontmatter , 2005 .
[24] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[25] Marc Joye,et al. The Montgomery Powering Ladder , 2002, CHES.
[26] Nigel P. Smart,et al. Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems , 2002 .
[27] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[28] Peng Ning,et al. Techniques and tools for analyzing intrusion alerts , 2004, TSEC.
[29] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[30] Kuldip Singh,et al. On a fault-tolerant multistage interconnection network , 1994 .