Building Adaptive and Agile Applications Using Intrusion Detection and Response
2024-1-7 15:31:25 Author: www.ndss-symposium.org(查看原文) 阅读量:5 收藏

A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities

David Wagner, J. Foster, Eric A. Brewer and A. Aiken

Read More

User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement

K. Jain and R. Sekar

Read More

Optimized Rekey for Group Communication Systems

O. Rodeh, K. Birman and D. Dolev

Read More

An IPSec-based Host Architecture for Secure Internet Multicast

R. Canetti, Pau-Chen Cheng, F. Giraud, D. Pendarakis, J. Rao, P. Rohatgi and D.Saha

Read More

A First Step Towards the Automatic Generation of Security Protocols

A. Perrig and Dawn Song

Read More

A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems

Y. Kortesniemi, T. Hasu and J. Sars

Read More

Secure Border Gateway Protocol (S-BGP) – Real World Performance and Deployment Issues

Stephen T Kent, C. Lynn, J. Mikkelson and K. Seo

Read More

BOF on Windows 2000 Security

Peter Brundrett

Read More

Analysis of a Fair Exchange Protocol

V. Shmatikov and John Mitchell

Read More

Secure Password-Based Cipher Suite for TLS

P. Buhler, T. Eirich, M. Waidner and M. Steiner

Read More

Chameleon Signatures

H. Krawczyk and T. Rabin

Read More

A Lightweight Tool for Detecting Web Server Attacks

M. Almgren, H. Debar and M. Dacier

Read More

Building Adaptive and Agile Applications Using Intrusion Detection and Response

J. Loyall, P. Pal and R. Schantz

Read More

Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies

D. Shands, R. Yee, J. Jacobs and E. J. Sebes

Read More

Security of Encrypted rlogin Connections Created With Kerberos IV

K. Hildrum

Read More

Accountability and Control of Process Creation in Metasystems

M. Humphrey, F. Knabe, A. Ferrari and A. Grimshaw

Read More


文章来源: https://www.ndss-symposium.org/ndss2000/accepted-papers/#Building%20Adaptive%20and%20Agile%20Applications%20Using%20Intrusion%20Detection%20and%20Response
如有侵权请联系:admin#unsafe.sh