A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Protecting web servers from distributed denial of service attacks
Proceedings of the 10th international conference on World Wide Web
Attack propagation in networks
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Improving the protection of assets in open distributed systems by use of X-ifying risk analysis
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Sleepy watermark tracing: an active network-based intrusion response framework
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
A laboratory-based course on internet security
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
Building Trustworthy Systems: Lessons from the PTN and Internet
IEEE Internet Computing
Security at the Internet Layer
Computer
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
IEEE Transactions on Computers
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Quantifying Network Denial of Service: A Location Service Case Study
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Adjusted Probabilistic Packet Marking for IP Traceback
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
Design and Implementation of Virtual Private Services
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
NSDF: a computer network system description framework and its application to network security
Computer Networks: The International Journal of Computer and Telecommunications Networking
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
A Systematic Approach to Multi-Stage Network Attack Analysis
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Audio watermarking algorithm for real-time speech integrity and authentication
Proceedings of the 2004 workshop on Multimedia and security
Timing the Application of Security Patches for Optimal Uptime
LISA '02 Proceedings of the 16th USENIX conference on System administration
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers
IEEE Transactions on Parallel and Distributed Systems
A software flaw taxonomy: aiming tools at security
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Inferring Internet denial-of-service activity
ACM Transactions on Computer Systems (TOCS)
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
Business use of the internet: an analytical framework and exploratory case study
International Journal of Electronic Commerce
Information Systems Frontiers
Modeling network intrusion detection alerts for correlation
ACM Transactions on Information and System Security (TISSEC)
Intrusion detection in web applications using text mining
Engineering Applications of Artificial Intelligence
Requirements for scalable access control and security management architectures
ACM Transactions on Internet Technology (TOIT)
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Enforcing well-formed and partially-formed transactions for Unix
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Specifications of a high-level conflict-free firewall policy language for multi-domain networks
Proceedings of the 12th ACM symposium on Access control models and technologies
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Defining categories to select representative attack test-cases
Proceedings of the 2007 ACM workshop on Quality of protection
Application of autonomic agents for global information grid management and security
Proceedings of the 2007 Summer Computer Simulation Conference
Analysis of flow-correlation attacks in anonymity network
International Journal of Security and Networks
Secure communication method in mobile wireless networks
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
A multi-layered security architecture for modelling complex systems
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
International Journal of Mobile Communications
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
Information Systems Research
A security architecture to protect against the insider threat from damage, fraud and theft
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Compromising anonymous communication systems using blind source separation
ACM Transactions on Information and System Security (TISSEC)
IAAI'05 Proceedings of the 17th conference on Innovative applications of artificial intelligence - Volume 3
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
A review of classification methods for network vulnerability
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Tagged fragment marking scheme with distance-weighted sampling for a fast IP traceback
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Towards a unified fault-detection benchmark
Proceedings of the 9th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering
A security ontology for incident analysis
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
A distributed and privacy-preserving method for network intrusion detection
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Review of software security defects taxonomy
RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls
Decision Support Systems
Through the description of attacks: a multidimensional view
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Computer system survivability modelling by using stochastic activity network
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Efficient technique for fast IP traceback
CDVE'06 Proceedings of the Third international conference on Cooperative Design, Visualization, and Engineering
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Towards practical attacker classification for risk analysis in anonymous communication
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A fast search and advanced marking scheme for network IP traceback model
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Hi-index | 0.01 |