© Adventium Labs, 2005 1 Course of Action Generation for Cyber Security Using Classical Planning Mark Boddy, Johnathan Gohde, Thomas Haigh, Steven Harp.
Martin Roesch Sourcefire Inc.. Topics Background –What is Snort? Using Snort Snort Architecture.
Modified slides from Martin Roesch Sourcefire Inc.
Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.
Copyright 2001 Martin Roesch, All Rights Reserved Martin Roesch Sourcefire Inc.
There are several ways we can define these sets. We will discuss two.