


default search action
Journal of Computer Security, Volume 10
Volume 10, Number 1/2, 2002
- Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok:

Toward Cost-Sensitive Modeling for Intrusion Detection and Response. 5-22 - Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni:

Using Internal Sensors and Embedded Detectors for Intrusion Detection. 23-70 - Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer:

STATL: An Attack Language for State-Based Intrusion Detection. 71-104 - Stuart Staniford, James A. Hoagland, Joseph M. McAlerney:

Practical Automated Detection of Stealthy Portscans. 105-136 - Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia:

Enhancing Profiles for Anomaly Detection Using Time Granularities. 137-158 - Diomidis Spinellis, Dimitris Gritzalis:

Panoptis: Intrusion Detection Using a Domain-Specific Language. 159-176 - Alec Yasinsac:

An Environment for Security Protocol Intrusion Detection. 177-188 - C. R. Ramakrishnan, R. Sekar:

Model-Based Analysis of Configuration Vulnerabilities. 189-209
Volume 10, Number 3, 2002
- Brian Neil Levine, Clay Shields:

Hordes: a Multicast-Based Protocol for Anonymity. 213-240 - Piero A. Bonatti, Pierangela Samarati:

A Uniform Framework for Regulating Service Access and Information Release on the Web. 241-272 - Ahto Buldas

, Peeter Laud
, Helger Lipmaa:
Eliminating Counterevidence with Applications to Accountable Certificate Management. 273-296
Volume 10, Number 4, 2002
- Gerald Brose:

Manageable Access Control for CORBA. 301-338 - Gerhard Schellhorn, Wolfgang Reif

, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll:
Verified Formal Security Models for Multiapplicative Smart Cards. 339-368 - Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon:

Checking Secure Interactions of Smart Card Applets: Extended Version. 369-398 - Ian Welch, Robert J. Stroud:

Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code. 399-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














