Building Attack Scenarios through Integration of Complementary Alert Correlation Method
2024-1-6 14:27:10 Author: www.ndss-symposium.org(查看原文) 阅读量:6 收藏

DoS Protection for Reliably Authenticated Broadcast

Carl A. Gunter, Sanjeev Khanna, Kaijun Tan and Santosh Venkatesh

Read More

Distillation Codes and Applications to DoS Resistant Multicast Authentication

C. Karlof, Naveen Sastry, Yaping Li, A. Perrig and J. D. Tygar

Read More

Efficient Context-Sensitive Intrusion Detection

Jonathon Giffin, Somesh Jha and Barton P. Miller

Read More

Global Intrusion Detection in the DOMINO Overlay System

Vinod Yegneswaran, Paul Barford and Somesh Jha

Read More

Building Attack Scenarios through Integration of Complementary Alert Correlation Method

Peng Ning, Dingbang Xu, Christopher G. Healey and Robert St Amant

Read More

Client-Side Defense Against Web-Based Identity Theft

Neil Chou, Robert Ledesma, Yuka Teraguchi and John Mitchell

Read More

Using Directional Antennas to Prevent Wormhole Attacks

Lingxuan Hu and David Evans

Read More

An Effective Architecture and Algorithm for Detecting Worms with Various Scan

Jiang Wu, Sarma Vangala, Lixin Gao and Kevin Kwiat

Read More

A Practical Dynamic Buffer Overflow Detector

Olatunji Ruwase and Monica S. Lam

Read More

Model Checking One Million Lines of C Code

Hao Chen, Drew Dean and David Wagner

Read More

Ostia: A Delegating Architecture for Secure System Call Interposition

Tal Garfinkel, Ben Pfaff and Mendel Rosenblum

Read More

Authentication and Integrity in Outsourced Databases

Einar Mykletun, Maithili Narasimha and Gene Tsudik

Read More

Building an Encrypted and Searchable Audit Log

Brent Waters, Dirk Balfanz, Glenn Durfee and D. K. Smetters

Read More

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography

Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura and Hans Eberle

Read More

The Design and Implementation of Datagram TLS

Nagendra Modadugu and Eric Rescorla

Read More

The Perils of Unauthenticated Encryption: Kerberos Version 4

Tom Yu, Sam Hartman and Kenneth Raeburn

Read More


文章来源: https://www.ndss-symposium.org/ndss2004/accepted-papers/#Building%20Attack%20Scenarios%20through%20Integration%20of%20Complementary%20Alert%20Correlation%20Method
如有侵权请联系:admin#unsafe.sh