The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A method for examining cryptographic protocols
A method for examining cryptographic protocols
Inductive analysis of the Internet protocol TLS
ACM Transactions on Information and System Security (TISSEC)
Identification of host audit data to detect attacks on low-level IP vulnerabilities
Journal of Computer Security
NetSTAT: a network-based intrusion detection system
Journal of Computer Security
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
The Theory and Practice of Concurrency
The Theory and Practice of Concurrency
A Framework for a Cryptographic Protocol Evaluation Workbench
HASE '99 The 4th IEEE International Symposium on High-Assurance Systems Engineering
Formal Verification of Cryptographic Protocols: A Survey
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Protocol Interactions and the Chosen Protocol Attack
Proceedings of the 5th International Workshop on Security Protocols
Proving Security Protocols Correct
LICS '99 Proceedings of the 14th Annual IEEE Symposium on Logic in Computer Science
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Prudent Engineering Practice for Cryptographic Protocols
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
On the security of public key protocols
On the security of public key protocols
Evaluating Cryptographic Protocols
Evaluating Cryptographic Protocols
A formal semantics for evaluating cryptographic protocols
A formal semantics for evaluating cryptographic protocols
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Metadata for Anomaly-Based Security Protocol Attack Deduction
IEEE Transactions on Knowledge and Data Engineering
Hi-index | 0.00 |
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion detection models. We examine the major cost factors associated with an ...