SEARCH THE HSDL

Advanced search    Help

Searching for terms: EXACT: "Mell, Peter"   in: author

Set an Alert to get future results

Results  1 - 18 (of 18)          sorted by relevance     sort by date

Clear all search criteria

Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).

  • Overview of Issues in Testing Intrusion Detection Systems
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Hu, Vincent C.; Lippmann, Richard
    2003-06
  • Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Grance, Tim
    2002-09
  • Intrusion Detection Systems
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Bace, Rebecca Gurley
  • Procedures for Handling Security Patches
    National Institute of Standards and Technology (U.S.)
    Tracy, Miles C.; Mell, Peter
    2002-08
  • Mitigating Emerging Hacker Threats
    Information Technology Laboratory (National Institute of Standards and Technology)
    Mell, Peter; Wack, John P.
    2000-06
  • Identifying Critical Patches with ICAT
    Information Technology Laboratory (National Institute of Standards and Technology)
    Mell, Peter
    2000-07
  • Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Scarefone, Karen
    2010-12
  • CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Architecture (Draft)
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Waltermire, David; Booth, Harold
  • Guide to Adopting and Using the Security Content Automation Protocol (SCAP) (Draft): Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Barrett, Matthew; Johnson, Chris
    2009-05
  • Guide to Intrusion Detection and Prevention Systems (IDPS): Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Scarfone, Karen; Mell, Peter
    2007-02
  • Creating a Patch and Vulnerability Management Program
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Bergeron, Tiffany; Henning, David
    2005-11
  • Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Nusbaum, Joseph; Scarfone, Karen
    2005-11
  • Applying Mobile Agents to Intrusion Detection and Response
    National Institute of Standards and Technology (U.S.)
    Jansen, Wayne A.; Mell, Peter; Karygiannis, Tom
    1999-10
  • Denial of Service Resistant Intrusion Detection Architecture
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Marks, Donald; McLarnon, Mark
    2000-05-24
  • NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology)
    Grance, Timothy; Mell, Peter
    2011-09
  • Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; McLarnon, Mark
    1999-08-10
  • Blockchain Technology Overview
    National Institute of Standards and Technology (U.S.)
    Yaga, Dylan; Mell, Peter; Roby, Nikolas . . .
    2018-10
  • Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft): Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Scarfone, Karen
    2012-07
      1