By Topic

Depth evaluation intrusion detection using Coloured Stochastic Petri Nets

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Chien-Chuan Lin ; Department of Engineering Science, National Cheng Kung University, No. 1, Ta-Hsueh Road, Tainan 70101, Taiwan ; Ming-Shi Wang

References

Showing 1-10 of 10 Results
  1. K. Jensen, Coloured Petri Nets Basic Concepts, Analysis Methods and Practical Use vol. 1: Springer-Verlag, 1992. 
    [CrossRef] 
  2. J. Zhou, M. Heckman, B. Reynolds, A. Carlson, and M. Bishop, "Modeling Network Intrusion Detection Alerts for Correlation," ACM Transactions on Information and System Security, vol. 10, No 1, Article 4, pp. 1-31, February 2007. 
  3. V. Corey, C. Peterman, S. Shearin, M. S.Greenberg, and J. V. Bokkelen, "Network Forensics Analysis," in IEEE Internet Computing, 2002, pp. 60-66. 
  4. L. M. Kristensen, J. B. Jorgensen, and K. Jensen, "Application of Coloured Petri Nets in System Development," in Lecture Notes in Computer Science. vol. 3098, W. R. In J. Desel, G. Rozenberg, Ed.: Springer-Verlag, 2004, pp. 626-685. 
  5. L. M. Kristensen and K. Jensen, "Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad-hoc Networks," in Lecture Notes in Computer Science. vol. 3147: Springer-Verlag, 2004, pp. 248-269. 
    [CrossRef] 
  6. O. M. Dahl, "Using Coloured Petri Nets in Penetration Testing," in Department of Computer Science and Media Technology. vol. Master Gjøvik: Gjøvik University College, 2005, pp. 1-89. 
  7. O. M. Dahl and S. D. Wolthusen, "Modeling and execution of complex attack scenarios using interval timed colored Petri nets," in the Fourth IEEE International Workshop on Information Assurance, 2006. 
  8. K. Jensen, Coloured Petri Nets Basic Concepts, Analysis Methods and Practical Use vol. 2: Springer-Verlag, 1997. 
    [CrossRef] 
  9. S. D. Moitra and S. L. Konda, "A Simulation Model for Managing Sur-vivability of Networked Information Systems," Carnegie Mellon Software Engineering Institute December 2000. 
  10. "CPNTools." http://wiki.daimi.au.dk/cpntools/cpntools.wiki