Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Ata de Congresso
|
Learning Unknown Attacks — A StartJust, James E. ; Reynolds, James C. ; Clough, Larry A. ; Danforth, Melissa ; Levitt, Karl N. ; Maglich, Ryan ; Rowe, JeffLecture notes in computer science, 2002, p.158-176 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
2 |
Material Type: Ata de Congresso
|
Hypercalcaemia and bony lesions in association with parathyroid and prostatic carcinomaKAPLAN, F. J. L ; FATAAR, A. B ; LEVITT, N. SJEMDSA, 2001, Vol.6 (1), p.6-8 [Periódico revisado por pares]Pinelands: Health and Medical Publishing GroupSem texto completo |
|
3 |
Material Type: Ata de Congresso
|
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc NetworksSong, Tao ; Ko, Calvin ; Tseng, Chinyang Henry ; Balasubramanyam, Poornima ; Chaudhary, Anant ; Levitt, Karl N.Formal Aspects in Security and Trust, 2006, p.16-33 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergSem texto completo |
|
4 |
Material Type: Ata de Congresso
|
A formal-specification based approach for protecting the domain name systemCheung, S. ; Levitt, K.N.Proceeding International Conference on Dependable Systems and Networks. DSN 2000, 2000, p.641-651Los Alamitos CA: IEEETexto completo disponível |
|
5 |
Material Type: Ata de Congresso
|
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social InformaticsRuaylong Lee ; Nia, R. ; Hsu, J. ; Levitt, K. N. ; Rowe, J. ; Wu, S. F. ; Shaozhi Ye2011 International Conference on Advances in Social Networks Analysis and Mining, 2011, p.195-202IEEETexto completo disponível |
|
6 |
Material Type: Ata de Congresso
|
A distributed host-based worm detection systemCheetancheri, Senthilkumar ; Agosta, John ; Dash, Denver ; Levitt, Karl ; Rowe, Jeff ; Schooler, EveApplications, Technologies, Architectures, and Protocols for Computer Communication: Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense; 11-15 Sept. 2006, 2006, p.107-113ACMTexto completo disponível |
|
7 |
Material Type: Ata de Congresso
|
Cost Sensitive Moving Target ConsensusDuan, Sisi ; Li, Yun ; Levitt, Karl N.United States 2016Sem texto completo |
|
8 |
Material Type: Ata de Congresso
|
Protecting routing infrastructures from denial of service using cooperative intrusion detectionCheung, Steven ; Levitt, KarlNew Security Paradigms Workshop: Proceedings of the 1997 workshop on New security paradigms; 23-26 Sept. 1997, 1998, p.94-106ACMTexto completo disponível |
|
9 |
Material Type: Ata de Congresso
|
Data level inference detection in database systemsYip, R.W. ; Levitt, E.N.Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), 1998, p.179-189IEEETexto completo disponível |
|
10 |
Material Type: Ata de Congresso
|
Proving multilevel security of a system designFeiertag, R J ; Levitt, K N ; Robinson, LOperating Systems Review, 1977, p.57-65Texto completo disponível |