-
1
-
-
33747371416
-
-
3131, SRI Int'l, July 11, 1994.
-
D. Anderson et al., "Next Generation Intrusion Detection Expert System (NIDES)," Software Design, Product Specification, and Version Description Document, Project 3131, SRI Int'l, July 11, 1994.
-
Et Al., "Next Generation Intrusion Detection Expert System (NIDES)," Software Design, Product Specification, and Version Description Document, Project
-
-
Anderson, D.1
-
2
-
-
33747379113
-
-
1995.
-
R.G. Bace, Division of Infosec Computer Science, Research, and Technology, Nat'l Security Agency, private communication, May 1995.
-
Division of Infosec Computer Science, Research, and Technology, Nat'l Security Agency, Private Communication, May
-
-
Bace, R.G.1
-
3
-
-
33747366975
-
-
1-16, Baltimore, Sept. 1992.
-
S.M. Bellovin, "There Be Dragons," Proc. Third USENIX UNIX Security Symp., pp. 1-16, Baltimore, Sept. 1992.
-
"There Be Dragons," Proc. Third USENIX UNIX Security Symp., Pp.
-
-
Bellovin, S.M.1
-
4
-
-
33747360746
-
-
19, no. 2, pp. 32-48, Apr. 1989.
-
S.M. Bellovin, "Security Problems in the TCP/IP Protocol Suite," ACM Computer Comm. Rev., vol. 19, no. 2, pp. 32-48, Apr. 1989.
-
"Security Problems in the TCP/IP Protocol Suite," ACM Computer Comm. Rev., Vol.
-
-
Bellovin, S.M.1
-
6
-
-
0018030915
-
-
8, pp. 721-729, 1978.
-
P. Brinch Hansen, "Reproducible Testing of Monitors," Software Practice and Experience, vol. 8, pp. 721-729, 1978.
-
Hansen, "Reproducible Testing of Monitors," Software Practice and Experience, Vol.
-
-
Brinch, P.1
-
7
-
-
33747373601
-
-
18th Nat'l Information Systems Security Conf., pp. 173-183, Baltimore, Oct. 1995.
-
M. Chung, N. Puketza, R.A. Olsson, and B. Mukherjee, "Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions," Proc., 18th Nat'l Information Systems Security Conf., pp. 173-183, Baltimore, Oct. 1995.
-
N. Puketza, R.A. Olsson, and B. Mukherjee, "Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions," Proc.
-
-
Chung, M.1
-
8
-
-
0023294428
-
-
13, no. 2, pp. 222-232, Feb. 1987.
-
D.E. Denning, "An Intrusion-Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
-
"An Intrusion-Detection Model," IEEE Trans. Software Eng., Vol.
-
-
Denning, D.E.1
-
9
-
-
33747344241
-
-
13th Nat'l Computer Security Conf., pp. 99-108, Washington, D.C., Oct. 1990.
-
C. Dowell and P. Ramstedt, "The COMPUTERWATCH Data Reduction Tool," Proc. 13th Nat'l Computer Security Conf., pp. 99-108, Washington, D.C., Oct. 1990.
-
And P. Ramstedt, "The COMPUTERWATCH Data Reduction Tool," Proc.
-
-
Dowell, C.1
-
13
-
-
0024984013
-
-
1990 IEEE Symp. Research in Security and Privacy, pp. 296-304, Oakland, Calif., May 1990.
-
L.T. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber, "A Network Security Monitor," Proc. 1990 IEEE Symp. Research in Security and Privacy, pp. 296-304, Oakland, Calif., May 1990.
-
G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber, "A Network Security Monitor," Proc.
-
-
Heberlein, L.T.1
-
14
-
-
0027593257
-
-
12, no. 3, pp. 235-248, May 1993.
-
J. Hochberg et al., "NADIR: An Automated System for Detecting Network Intrusion and Misuse," Computers and Security, vol. 12, no. 3, pp. 235-248, May 1993.
-
Et Al., "NADIR: an Automated System for Detecting Network Intrusion and Misuse," Computers and Security, Vol.
-
-
Hochberg, J.1
-
15
-
-
0027150412
-
-
16-28, Oakland, Calif., May 1993.
-
K. Ilgun, "USTAT: A Real-Time Intrusion Detection System for UNIX," Proc. IEEE Symp. Research in Security and Privacy, pp. 16-28, Oakland, Calif., May 1993.
-
"USTAT: a Real-Time Intrusion Detection System for UNIX," Proc. IEEE Symp. Research in Security and Privacy, Pp.
-
-
Ilgun, K.1
-
16
-
-
0029267472
-
-
21, no. 3, pp. 181-199, Mar. 1995.
-
K. Ilgun, R.A. Kemmerer, and P.A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach," IEEE Trans. Software Eng., vol. 21, no. 3, pp. 181-199, Mar. 1995.
-
R.A. Kemmerer, and P.A. Porras, "State Transition Analysis: a Rule-Based Intrusion Detection Approach," IEEE Trans. Software Eng., Vol.
-
-
Ilgun, K.1
-
17
-
-
0026154682
-
-
316-376, Oakland, Calif., May 1991.
-
H.S. Javitz and A. Valdes, "The SRI IDES Statistical Anomaly Detector," Proc. IEEE Symp. Research in Security and Privacy, pp. 316-376, Oakland, Calif., May 1991.
-
And A. Valdes, "The SRI IDES Statistical Anomaly Detector," Proc. IEEE Symp. Research in Security and Privacy, Pp.
-
-
Javitz, H.S.1
-
18
-
-
33747338290
-
-
17, 1995.
-
S. Kumar and E.H. Spafford, "A Software Architecture to Support Misuse Intrusion Detection," Technical Report CSD-TK-95-009, Purduc Univ., Mar. 17, 1995.
-
And E.H. Spafford, "A Software Architecture to Support Misuse Intrusion Detection," Technical Report CSD-TK-95-009, Purduc Univ., Mar.
-
-
Kumar, S.1
-
19
-
-
33747341329
-
-
17, 1994.
-
S. Kumar and E.H. Spafford, "An Application of Pattern Matching in Intrusion Detection," Technical Report CSD-TR-94-013, Purdue Univ., June 17, 1994.
-
And E.H. Spafford, "An Application of Pattern Matching in Intrusion Detection," Technical Report CSD-TR-94-013, Purdue Univ., June
-
-
Kumar, S.1
-
20
-
-
33747356508
-
-
17th Nat'l Computer Security Conf., pp. 11-21, Baltimore, Oct. 1994.
-
S. Kumar and E.H. Spafford, "A Pattern Matching Model for Misuse Intrusion Detection," Proc. 17th Nat'l Computer Security Conf., pp. 11-21, Baltimore, Oct. 1994.
-
And E.H. Spafford, "A Pattern Matching Model for Misuse Intrusion Detection," Proc.
-
-
Kumar, S.1
-
21
-
-
0028514027
-
-
26, no. 3, pp. 211-254, Sept. 1994.
-
C.E. Landwehr et al., "A Taxonomy of Computer Program Security Flaws," ACM Computing Surveys, vol. 26, no. 3, pp. 211-254, Sept. 1994.
-
Et Al., "A Taxonomy of Computer Program Security Flaws," ACM Computing Surveys, Vol.
-
-
Landwehr, C.E.1
-
22
-
-
0023328934
-
-
36, no. 4. pp. 471-482, Apr. 1987.
-
T.J. LeBlanc and J.M. Mellor-Crummey, "Debugging Parallel Programs with Instant Replay," IEEE Trans. Computers, vol. 36, no. 4. pp. 471-482, Apr. 1987.
-
And J.M. Mellor-Crummey, "Debugging Parallel Programs with Instant Replay," IEEE Trans. Computers, Vol.
-
-
Leblanc, T.J.1
-
24
-
-
84864228244
-
-
1990.
-
T.F. Lunt et al., "IDES: A Progress Report," Proc. Sixth Ann. Computer Security Applications Conf., Tucson, Ariz., Dec. 1990.
-
Et Al., "IDES: a Progress Report," Proc. Sixth Ann. Computer Security Applications Conf., Tucson, Ariz., Dec.
-
-
Lunt, T.F.1
-
25
-
-
33747360191
-
-
6784, SRI Int'l, May 1990.
-
T.F. Lunt et al., "A Real-Time Intrusion Detection Expert System(IDES)," Interim Progress Report, Project 6784, SRI Int'l, May 1990.
-
Et Al., "A Real-Time Intrusion Detection Expert System(IDES)," Interim Progress Report, Project
-
-
Lunt, T.F.1
-
27
-
-
0028430224
-
-
8, no. 3, pp. 26-41, May/June 1994.
-
B. Mukherjee, L.T. Heberlein, and K.N. Levitt, "Network Intrusion Detection," IEEE Network, vol. 8, no. 3, pp. 26-41, May/June 1994.
-
L.T. Heberlein, and K.N. Levitt, "Network Intrusion Detection," IEEE Network, Vol.
-
-
Mukherjee, B.1
-
28
-
-
33747359684
-
-
12th Nat'l Computer Security Conf., pp. 396-407, Baltimore, Oct. 1989.
-
P.C. Neumann and D.B. Parker, "A Summary of Computer Misuse Techniques," Proc. 12th Nat'l Computer Security Conf., pp. 396-407, Baltimore, Oct. 1989.
-
And D.B. Parker, "A Summary of Computer Misuse Techniques," Proc.
-
-
Neumann, P.C.1
-
30
-
-
85094814712
-
-
91-118, Santa Clara, Calif., Oct. 1993.
-
D.R. Safford, D.L. Schales, and O.K. Hess, "The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment," Proc. Fourth USENIX UNIX Security Symp., pp. 91-118, Santa Clara, Calif., Oct. 1993.
-
D.L. Schales, and O.K. Hess, "The TAMU Security Package: an Ongoing Response to Internet Intruders in an Academic Environment," Proc. Fourth USENIX UNIX Security Symp., Pp.
-
-
Safford, D.R.1
-
31
-
-
33747344765
-
-
11th Nat'l Computer Security Conf., pp. 74-81, Baltimore, Oct. 1988.
-
M.M. Sebring, E. Shellhouse, M.E. Hanna, and R.A. Whitehurst, "Expert Systems in Intrusion Detection: A Case Study," Proc. 11th Nat'l Computer Security Conf., pp. 74-81, Baltimore, Oct. 1988.
-
E. Shellhouse, M.E. Hanna, and R.A. Whitehurst, "Expert Systems in Intrusion Detection: a Case Study," Proc.
-
-
Sebring, M.M.1
-
32
-
-
0024122965
-
-
1988.
-
S.E. Smaha, "Haystack: An Intrusion Detection System," Proc. IEEE Fourth Aerospace Computer Security Applications Conf., Orlando, Fla., Dec. 1988.
-
"Haystack: an Intrusion Detection System," Proc. IEEE Fourth Aerospace Computer Security Applications Conf., Orlando, Fla., Dec.
-
-
Smaha, S.E.1
-
33
-
-
33747347014
-
-
14th Nat'l Computer Security Conf., pp. 167-176, Washington, D.C., Oct. 1991.
-
S. Snapp, J. Brentano, G. Dias, T. Goan, L. Heberlein, C. Ho, K. Levitt, B. Mukherjee, S. Smaha, T. Grance, D. Teal, and D. Mansur, "DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype," Proc. 14th Nat'l Computer Security Conf., pp. 167-176, Washington, D.C., Oct. 1991.
-
J. Brentano, G. Dias, T. Goan, L. Heberlein, C. Ho, K. Levitt, B. Mukherjee, S. Smaha, T. Grance, D. Teal, and D. Mansur, "DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and an Early Prototype," Proc.
-
-
Snapp, S.1
-
34
-
-
0026188143
-
-
17, no. 7, pp. 703-711, July 1991.
-
E.J. Weyuker and B. Jeng, "Analyzing Partition Testing Strategies," IEEE Trans. Software Eng., vol. 17, no. 7, pp. 703-711, July 1991.
-
And B. Jeng, "Analyzing Partition Testing Strategies," IEEE Trans. Software Eng., Vol.
-
-
Weyuker, E.J.1
|