Journal of Computer Security, Volume 10
Volume 10, Number 1/2, 2002
- Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok:
Toward Cost-Sensitive Modeling for Intrusion Detection and Response. 5-22 - Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni:
Using Internal Sensors and Embedded Detectors for Intrusion Detection. 23-70 - Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection. 71-104 - Stuart Staniford, James A. Hoagland, Joseph M. McAlerney:
Practical Automated Detection of Stealthy Portscans. 105-136 - Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia:
Enhancing Profiles for Anomaly Detection Using Time Granularities. 137-158 - Diomidis Spinellis, Dimitris Gritzalis:
Panoptis: Intrusion Detection Using a Domain-Specific Language. 159-176
Volume 10, Number 3, 2002
- Piero A. Bonatti, Pierangela Samarati:
A Uniform Framework for Regulating Service Access and Information Release on the Web. 241-272 - Ahto Buldas, Peeter Laud, Helger Lipmaa:
Eliminating Counterevidence with Applications to Accountable Certificate Management. 273-296
Volume 10, Number 4, 2002
- Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll:
Verified Formal Security Models for Multiapplicative Smart Cards. 339-368 - Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon:
Checking Secure Interactions of Smart Card Applets: Extended Version. 369-398 - Ian Welch, Robert J. Stroud:
Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code. 399-432