Know Your Achilles' Heel: Automatic Detection of Network Critical Services | 1 | 0.39 | 2015 |
Prison: Tracking Process Interactions to Contain Malware | 1 | 0.34 | 2015 |
Rippler: Delay injection for service dependency detection | 8 | 0.52 | 2014 |
Formulating Cyber-Security as Convex Optimization Problems | 2 | 0.65 | 2013 |
20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly. | 0 | 0.34 | 2013 |
Formal analysis of an electronic voting system: An experience report | 4 | 0.39 | 2011 |
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). | 0 | 0.34 | 2011 |
Refinement and Verification of Real-Time Systems | 0 | 0.34 | 2010 |
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008 | 0 | 0.34 | 2009 |
Formal analysis of attacks for e-voting system | 2 | 0.36 | 2009 |
How to steal a botnet and what can happen when you do | 0 | 0.34 | 2009 |
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 | 8 | 2.68 | 2008 |
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense | 1 | 0.39 | 2008 |
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense | 0 | 0.34 | 2008 |
08102 Outcome Working Group -- Situational Awareness | 0 | 0.34 | 2008 |
Using a virtual security testbed for digital forensic reconstruction | 6 | 0.69 | 2007 |
So You Think You Can Dance? | 0 | 0.34 | 2007 |
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks | 59 | 2.55 | 2006 |
Using hidden markov models to evaluate the risks of intrusions | 25 | 1.78 | 2006 |
Behavior-based spyware detection | 91 | 8.34 | 2006 |
Digital forensic reconstruction and the virtual security testbed vise | 7 | 0.60 | 2006 |
Hi-DRA: Intrusion Detection for Internet Security | 15 | 0.74 | 2005 |
Designing and implementing a family of intrusion detection systems | 7 | 0.82 | 2005 |
Past pushdown timed automata and safety verification | 6 | 0.52 | 2004 |
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks | 53 | 2.56 | 2004 |
Internet security and intrusion detection | 1 | 0.42 | 2003 |
Presburger liveness verification of discrete timed automata | 10 | 0.55 | 2003 |
Cybersecurity. | 0 | 0.34 | 2003 |
A Stateful Intrusion Detection System for World-Wide Web Servers | 59 | 4.34 | 2003 |
Generalized discrete timed automata: decidable approximations for safety verification | 9 | 0.60 | 2003 |
Designing and implementing a family of intrusion detection systems | 35 | 2.57 | 2003 |
Stateful intrusion detection for high-speed network's | 118 | 8.22 | 2002 |
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later | 28 | 1.74 | 2002 |
STATL: an attack language for state-based intrusion detection | 170 | 13.59 | 2002 |
Composable Tools For Network Discovery and Security Analysis | 5 | 0.96 | 2002 |
Counter machines and verification Problems | 14 | 0.71 | 2002 |
Decidable Approximations on Generalized and Parameterized Discrete Timed Automata | 6 | 0.50 | 2001 |
Designing a Web of Highly-Configurable Intrusion Detection Sensors | 25 | 4.35 | 2001 |
Evaluating the Security of Three Java-Based Mobile Agent Systems | 11 | 0.89 | 2001 |
On Presburger Liveness of Discrete Timed Automata | 6 | 0.46 | 2001 |
Conter Machines: Decidable Properties and Applications to Verification Problems | 21 | 0.87 | 2000 |
Binary Reachability Analysis of Discrete Pushdown Timed Automata | 53 | 1.73 | 2000 |
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems | 8 | 0.54 | 2000 |
Parallel Refinement Mechanisms for Real-Time Systems | 1 | 0.37 | 2000 |
Implementing security policies using the Safe Areas of Computation approach | 2 | 0.45 | 2000 |
NetSTAT: a network-based intrusion detection system | 108 | 19.46 | 1999 |
Safe Areas of Computation for Secure Computing with Insecure Applications | 5 | 0.55 | 1999 |
The design and analysis of real-time systems using the ASTRAL software development environment | 13 | 0.77 | 1999 |
Editorial | 0 | 0.34 | 1999 |
Using the ASTRAL model checker to analyze Mobile IP | 19 | 1.44 | 1999 |