-
1
-
-
0023294428
-
An intrusion detection model
-
February
-
D. Denning, An intrusion detection model, IEEE Transactions on Software Engineering, Vol. 13, No. 2, pp. 222-232, February 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
3
-
-
0034588633
-
On the trail of intrusions into information systems
-
December
-
S. Kent, On the trail of intrusions into information systems, IEEE Spectrum, pp. 52-56, December 2000.
-
(2000)
IEEE Spectrum
, pp. 52-56
-
-
Kent, S.1
-
5
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Carnegie Mellon University, Software Engineering Institute, January
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner, State of the practice of intrusion detection technologies, Technical Report CMU/SEI-99-TR-028, Carnegie Mellon University, Software Engineering Institute, January 2000.
-
(2000)
Technical Report
, vol.CMU-SEI-99-TR-028
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
7
-
-
0003482133
-
-
Intrusion. Net Books, First Edition
-
E. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back and Response, Intrusion. Net Books, First Edition, 1999.
-
(1999)
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back and Response
-
-
Amoroso, E.1
-
9
-
-
0038048503
-
Integrating intrusion detection and network management
-
Florence, Italy, April
-
X. Qin, W. Lee, L. Lewis, and J. B. D. Cabrera, Integrating intrusion detection and network management, Proceedings of the Eighth IEEE/IFIP Network Operations and Management Symposium, Florence, Italy, pp. 329-344, April 2002.
-
(2002)
Proceedings of the Eighth IEEE/IFIP Network Operations and Management Symposium
, pp. 329-344
-
-
Qin, X.1
Lee, W.2
Lewis, L.3
Cabrera, J.B.D.4
-
10
-
-
84862341314
-
Using MIB II variables for network intrusion detection
-
D. Barbará and S. Jajodia, eds., Kluwer Academic Publishers, Boston, in press
-
X. Qin, W. Lee, L. Lewis, and J. B. D. Cabrera, Using MIB II variables for network intrusion detection. D. Barbará and S. Jajodia, eds., Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, 2002 (in press).
-
(2002)
Applications of Data Mining in Computer Security
-
-
Qin, X.1
Lee, W.2
Lewis, L.3
Cabrera, J.B.D.4
-
11
-
-
1942531190
-
Proactive intrusion detection - A study on temporal data mining
-
D. Barbara and S. Jajodia, eds., Kluwer Academic Publishers, Boston, in press
-
J. B. D. Cabrera, L. Lewis, X. Qin, W. Lee, and R. K. Mehra, Proactive intrusion detection - A study on temporal data mining. D. Barbara and S. Jajodia, eds., Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, 2002 (in press).
-
(2002)
Applications of Data Mining in Computer Security
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Mehra, R.K.5
-
12
-
-
1942499331
-
Extracting precursor rules from time series - A classical statistical viewpoint
-
Arlington, Virginia, April
-
J. B. D. Cabrera and R. K. Mehra, Extracting precursor rules from time series - A classical statistical viewpoint, Proceedings of the Second SIAM International Conference on Data Mining, Arlington, Virginia, pp. 213-228, April 2002.
-
(2002)
Proceedings of the Second SIAM International Conference on Data Mining
, pp. 213-228
-
-
Cabrera, J.B.D.1
Mehra, R.K.2
-
13
-
-
77957873516
-
Rule discovery from time series
-
G. Das, K.-I. Lin, H. Mannila, G. Renganathan, and P. Smyth, Rule discovery from time series, Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining, pp. 16-22, 1998.
-
(1998)
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining
, pp. 16-22
-
-
Das, G.1
Lin, K.-I.2
Mannila, H.3
Renganathan, G.4
Smyth, P.5
-
14
-
-
1942531189
-
Science and Technology Section, Internet security - Anatomy of an attack
-
February 19
-
Science and Technology Section, Internet security - Anatomy of an attack, The Economist, pp. 80-81, February 19, 2000.
-
(2000)
The Economist
, pp. 80-81
-
-
-
15
-
-
85084161486
-
Inferring Internet Denial-of-Service Activity
-
Washington, D.C.
-
D. Moore, G. M. Voelker, and S. Savage, Inferring Internet Denial-of-Service Activity, Proceedings of USENIX Security Symposium, Washington, D.C., 2001.
-
(2001)
Proceedings of USENIX Security Symposium
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
16
-
-
0008723266
-
Distributed denial of service - Trin00, Tribe flood network, tribe flood network 2000, and Stacheldraht
-
CIAC-2319, Department of Energy - Computer Incident Advisory Capability, (CIAC) February
-
P. J. Criscuolo, Distributed denial of service - Trin00, Tribe flood network, tribe flood network 2000, and Stacheldraht, Technical Report CIAC-2319, Department of Energy - Computer Incident Advisory Capability, (CIAC) February 2000.
-
(2000)
Technical Report
-
-
Criscuolo, P.J.1
-
18
-
-
0033712953
-
Statistical traffic modeling for network intrusion detection
-
IEEE Computer Society, San Francisco, California, August
-
J. B. D. Cabrera, B. Ravichandran, and R. K. Mehra, Statistical traffic modeling for network intrusion detection, Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, IEEE Computer Society, San Francisco, California, pp. 466-473, August 2000.
-
(2000)
Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 466-473
-
-
Cabrera, J.B.D.1
Ravichandran, B.2
Mehra, R.K.3
-
20
-
-
27144468394
-
Discovery of frequent episodes in event sequences
-
H. Mannila, H. Toivonen, and A. I. Verkamo, Discovery of frequent episodes in event sequences, Data Mining and Knowledge Discovery, Vol. 1, No. 3, pp. 259-289, 1997.
-
(1997)
Data Mining and Knowledge Discovery
, vol.1
, Issue.3
, pp. 259-289
-
-
Mannila, H.1
Toivonen, H.2
Verkamo, A.I.3
-
21
-
-
0027883358
-
Database mining: A performance perspective
-
December
-
R. Agrawal, T. Imielinski, and A. Swami, Database mining: A performance perspective, IEEE Transactions on Knowledge and Data Engineering, Vol. 5, No. 6, pp. 914-925, December 1993.
-
(1993)
IEEE Transactions on Knowledge and Data Engineering
, vol.5
, Issue.6
, pp. 914-925
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
22
-
-
0000351727
-
Investigating causal relations by econometric models and cross-spectral methods
-
C. W. J. Granger, Investigating causal relations by econometric models and cross-spectral methods, Econometrica, Vol. 34, pp. 424-438, 1969.
-
(1969)
Econometrica
, vol.34
, pp. 424-438
-
-
Granger, C.W.J.1
-
24
-
-
0004083354
-
-
John Wiley, New York, Second Edition
-
M. Evans, N. Hastings, and B. Peacock, Statistical Distributions. John Wiley, New York, Second Edition, 1993.
-
(1993)
Statistical Distributions
-
-
Evans, M.1
Hastings, N.2
Peacock, B.3
-
25
-
-
0003594381
-
-
Duxbury Press, Belmont, California
-
G. Casella and R. L. Berger, Statistical Inference, Duxbury Press, Belmont, California, p. 364, 1990.
-
(1990)
Statistical Inference
, pp. 364
-
-
Casella, G.1
Berger, R.L.2
-
26
-
-
0032154135
-
Proactive anomaly detection using distributed agents
-
September
-
M. Thottan and C. Ji, Proactive anomaly detection using distributed agents, IEEE Network, pp. 21-27, September 1998.
-
(1998)
IEEE Network
, pp. 21-27
-
-
Thottan, M.1
Ji, C.2
-
27
-
-
0033681806
-
An approach to on-line predictive detection
-
IEEE Computer Society, San Francisco, California, August
-
F. Zhang and J. Hellerstein, An approach to on-line predictive detection, Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, IEEE Computer Society, San Francisco, California, pp. 549-556, August 2000.
-
(2000)
Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 549-556
-
-
Zhang, F.1
Hellerstein, J.2
-
28
-
-
0035728158
-
The monitoring, detection, interpretation and response paradigm for the security of battlespace networks
-
Washington, D.C., October
-
J. B. D. Cabrera, L. J. Popyack, Jr., L. Lewis, B. Ravichandran, and R. K. Mehra, The monitoring, detection, interpretation and response paradigm for the security of battlespace networks, Proceedings of IEEE MILCOM 2001, Washington, D.C., October 2001.
-
(2001)
Proceedings of IEEE MILCOM 2001
-
-
Cabrera, J.B.D.1
Popyack Jr., L.J.2
Lewis, L.3
Ravichandran, B.4
Mehra, R.K.5
-
29
-
-
84962267363
-
Infrastructure for intrusion detection and response
-
Hilton Head Island, South Carolina, January
-
D. Schnackenberg, K. Djahandari, and D. Sterne, Infrastructure for intrusion detection and response, Proceedings of DARPA Information Survivability Conference and Exposition, Hilton Head Island, South Carolina, January 2000.
-
(2000)
Proceedings of DARPA Information Survivability Conference and Exposition
-
-
Schnackenberg, D.1
Djahandari, K.2
Sterne, D.3
-
33
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
in press
-
W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok, Toward cost-sensitive modeling for intrusion detection and response, Journal of Computer Security, 2002 (in press).
-
(2002)
Journal of Computer Security
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
34
-
-
0033723632
-
Network security management with intelligent agents
-
IEEE Publishing
-
K. Boudaoud, H. Labiod, R. Boutaba, and Z. Guessoum, Network security management with intelligent agents, IEEE Publishing, Proceedings of NOMS, 2000.
-
(2000)
Proceedings of NOMS
-
-
Boudaoud, K.1
Labiod, H.2
Boutaba, R.3
Guessoum, Z.4
-
35
-
-
0033723713
-
ISCP: Design and implementation of an inter-domain Security Management Agent (SMA) coordination protocol
-
IEEE Publishing
-
Z. Fu, H. Huang, T. Wu, S. Wu, F. Gong, C. Xu, and I. Baldine, ISCP: Design and implementation of an inter-domain Security Management Agent (SMA) coordination protocol, IEEE Publishing, Proceedings of NOMS, 2000.
-
(2000)
Proceedings of NOMS
-
-
Fu, Z.1
Huang, H.2
Wu, T.3
Wu, S.4
Gong, F.5
Xu, C.6
Baldine, I.7
|