Formal Reasoning About Intrusion Detection Systems
- 1 January 2004
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Log auditing through model-checkingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Formal specication of intrusion signatures and detection rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Automated detection of vulnerabilities in privileged programs by execution monitoringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Continuous assessment of a Unix configuration: integrating intrusion detection and configuration analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Execution monitoring of security-critical programs in distributed systems: a specification-based approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Data mining methods for detection of new malicious executablesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Intrusion detection via static analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Logic induction of valid behavior specifications for intrusion detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- System Health and Intrusion Monitoring Using a Hierarchy of ConstraintsLecture Notes in Computer Science, 2001
- Experiences with Specification-Based Intrusion DetectionLecture Notes in Computer Science, 2001