-
1
-
-
84944978730
-
-
Trusted Computer System Evaluation Criteria, DOD 52D0.28-STD Orange Book Dec.
-
National Computer Security Center, Department of Defense, Trusted Computer System Evaluation Criteria, DOD 52D0.28-STD, Dec. 1985 (Orange Book).
-
(1985)
National Computer Security Center, Department of Defense
-
-
-
2
-
-
84944986087
-
-
Trusted Computer System Evaluation Criteria, DOD 5200.28-STD Red Book July
-
National Computer Security Center, Dept. of Defense, Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, July 1987 (Red Book).
-
(1987)
National Computer Security Center, Dept. of Defense
-
-
-
3
-
-
0022090414
-
Security in high-level network protocols
-
July
-
V. L. Vaydock and S. T. Kent, “Security in high-level network protocols,” IEEE Commun. Mag., vol. 23, no. 7, pp. 12–24, July 1985.
-
(1985)
IEEE Commun. Mag.
, vol.23
, Issue.7
, pp. 12-24
-
-
Vaydock, V.L.1
Kent, S.T.2
-
4
-
-
0023294428
-
An intrusion-detection model
-
Feb.
-
D. E. Denning, “An intrusion-detection model,” IEEE Trans, on Software Engg., vol. SE-13, pp. 222–232, Feb. 1987.
-
(1987)
IEEE Trans, on Software Engg.
, vol.SE-13
, pp. 222-232
-
-
Denning, D.E.1
-
6
-
-
0242584044
-
The COMPUTERWATCH data reduction tool
-
Washington, DC Oct.
-
C. Dowell and P. Ramstedt, “The COMPUTERWATCH data reduction tool,“Proc., 13th National Computer Security Conference, Washington, DC, pp. 99–108, Oct. 1990.
-
(1990)
Proc., 13th National Computer Security Conference
, pp. 99-108
-
-
Dowell, C.1
Ramstedt, P.2
-
11
-
-
0003231931
-
The SRI IDES Statistical Anomaly Detector
-
Oakland, CA May
-
H. S. Javitz and A. Valdez, “The SRI IDES Statistical Anomaly Detector,” Proc., 1991 IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1991.
-
(1991)
Proc., 1991 IEEE Symposium on Research in Security and Privacy
-
-
Javitz, H.S.1
Valdez, A.2
-
13
-
-
0039952570
-
A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks
-
Washington, D.C. Oct.
-
J. R. Winkler, “A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks, “Proc. 13th National Computer Security Conference, Washington, D.C., Oct. 1990, 115–124.
-
(1990)
Proc. 13th National Computer Security Conference
, pp. 115-124
-
-
Winkler, J.R.1
-
14
-
-
2942645420
-
Expert systems in intrusion detection: A case study
-
Baltimore, MD Oct.
-
M. M. Sebring et al., “Expert systems in intrusion detection: A case study,” Proc., 11th National Computer Security Conf., Baltimore, MD, Oct. 1988. [15] H. S. Vaccaro and G. E. Liepins, “Detection of anomalous computer session activity,” Proc., 1989 Symposium on Research in Security and Privacy, Oakland, CA, pp. 280–289, May 1989.
-
(1988)
Proc., 11th National Computer Security Conf.
-
-
Sebring, M.M.1
-
15
-
-
0024665277
-
Detection of anomalous computer session activity
-
Oakland, CA
-
H. S. Vaccaro and G. E. Liepins, “Detection of anomalous computer session activity,” Proc., 1989 Symposium on Research in Security and Privacy, Oakland, CA, pp. 280–289, May 1989.
-
(1989)
Proc., 1989 Symposium on Research in Security and Privacy
, pp. 280-289
-
-
Vaccaro, H.S.1
Liepins, G.E.2
-
16
-
-
0027593257
-
NADIR: an automated system for detecting network intrusion and misuse
-
May
-
J. Hochberg et al., “NADIR: an automated system for detecting network intrusion and misuse,” Computers and Security, vol. 12, no. 3, pp. 235–248, May 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.3
, pp. 235-248
-
-
Hochberg, J.1
-
17
-
-
0024984013
-
A network security monitor
-
Oakland, CA May
-
L. T. Heberlein et al. “A network security monitor,” Proc., 1990 Symposium on Research in Security and Privacy, Oakland, CA, 296–304, May 1990.
-
(1990)
Proc., 1990 Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.T.1
-
18
-
-
84944988623
-
-
personal communication
-
T. F. Lunt, personal communication, 1992.
-
(1992)
-
-
Lunt, T.F.1
-
20
-
-
0009016272
-
An evening with berferd, in which a cracker is lured, endured, and studied
-
San Francisco Jan.
-
W. R. Cheswick, “An evening with berferd, in which a cracker is lured, endured, and studied,” Proc., Winter USENIX Conference, San Francisco, Jan. 1992.
-
(1992)
Proc., Winter USENIX Conference
-
-
Cheswick, W.R.1
-
21
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Review, April
-
S. M. Bellovin, “Security problems in the TCP/IP protocol suite,” ACM Computer Commun. Review, vol. 19, no. 2, pp. 32–48, April 1989.
-
(1989)
ACM Computer Commun.
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
22
-
-
0024984441
-
Adaptive real-time anomaly detection using inductively generated sequential patterns
-
Oakland, CA May
-
H. S. Teng, K. Chen, and S. C.-Y. Lu, “Adaptive real-time anomaly detection using inductively generated sequential patterns,” Proc., 1990 Symposium on Research in Security and Privacy, Oakland, CA, May 1990.
-
(1990)
Proc., 1990 Symposium on Research in Security and Privacy
-
-
Teng, H.S.1
Chen, K.2
Lu, S.C.Y.3
-
23
-
-
84944988626
-
Detecting intrusions through attack signature analysis
-
Herndon, VA Aug.
-
S. R. Snapp, B. Mukherjee, and K. N. Levitt, “Detecting intrusions through attack signature analysis,” Proc., 3rd Workshop on Computer Security Incident Handling, Herndon, VA, Aug. 1991.
-
(1991)
Proc., 3rd Workshop on Computer Security Incident Handling
-
-
Snapp, S.R.1
Mukherjee, B.2
Levitt, K.N.3
-
24
-
-
84944980222
-
Signature Analysis and Communication Issues in a Distributed Intrusion Detection System
-
Division of Computer Science University of California, Davis Aug.
-
S. R. Snapp, Signature Analysis and Communication Issues in a Distributed Intrusion Detection System, M.S. thesis, Division of Computer Science, University of California, Davis, Aug. 1991.
-
(1991)
M.S. thesis
-
-
Snapp, S.R.1
-
25
-
-
0242409064
-
Intrusion Detection: The Application of Feature Selection, a Comparison of Algorithms, and the Application of a Wide Area Network Analyzer
-
Division of Computer Science, University of California, Davis August
-
J. Doak, Intrusion Detection: The Application of Feature Selection, a Comparison of Algorithms, and the Application of a Wide Area Network Analyzer, M.S. thesis, Division of Computer Science, University of California, Davis, August 1992.
-
(1992)
M.S. thesis
-
-
Doak, J.1
-
26
-
-
84944988627
-
Software toolkit for analysis research (STAR)
-
Los Alamos National Laborator Aug.
-
T. Burr, et al., “Software toolkit for analysis research (STAR),” Technical Report No. LA-12617-MS, Los Alamos National Laboratory, Aug. 1993.
-
(1993)
Technical Report No. LA-12617-MS
-
-
Burr, T.1
-
27
-
-
84944988628
-
Towards Detecting Intrusions in a Networked Environment
-
Division of Computer Science University of California, Davis June
-
L T. Heberlein, Towards Detecting Intrusions in a Networked Environment, M. S. thesis, Division of Computer Science, University of California, Davis, June 1991.
-
(1991)
M. S. thesis
-
-
Heberlein, L.T.1
-
28
-
-
84944984133
-
Towards detecting intrusions in a networked environment
-
Concord, CA May
-
L. T. Heberlein et al. “Towards detecting intrusions in a networked environment,” Proc., 14th DOE Conference on Computer Security, Concord, CA, May 1991, pp. 17–47 — 17–65.
-
(1991)
Proc., 14th DOE Conference on Computer Security
-
-
Heberlein, L.T.1
-
29
-
-
3943089629
-
A method to detect intrusive activity in a networked environment
-
Washington, DC Oct.
-
L. T. Heberlein, K. N. Levitt, and B. Mukherjee, “A method to detect intrusive activity in a networked environment, Proc., 14th National Computer Security Conference, Washington, DC, pp. 362–371, Oct. 1991.
-
(1991)
Proc., 14th National Computer Security Conference
, pp. 362-371
-
-
Heberlein, L.T.1
Levitt, K.N.2
Mukherjee, B.3
-
31
-
-
0026402266
-
A system for distributed intrusion detection
-
San Francisco, CA Feb.
-
S.R. Snappetal., “A system for distributed intrusion detection,” Proc., IEEE COMFCON 91, San Francisco, CA, Feb. 1991, pp. 170–176.
-
(1991)
Proc., IEEE COMFCON 91
, pp. 170-176
-
-
Snappetal, S.R.1
-
32
-
-
0002473030
-
DIDS (Distributed Intrusion Detection System) — Motivation, Architecture, and An Early Prototype
-
Washington, D.C. Oct.
-
S. R. Snapp et al., “DIDS (Distributed Intrusion Detection System) — Motivation, Architecture, and An Early Prototype,” Proc., 14th National Computer Security Conf., Washington, D.C., Oct. 1991.
-
(1991)
Proc., 14th National Computer Security Conf.
-
-
Snapp, S.R.1
-
33
-
-
0040545593
-
Internet security monitor: An intrusion-detection system for large-scale networks
-
Baltimore, MD Oct.
-
L. T. Heberlein, B. Mukherjee, and K. N. Levitt, “Internet security monitor: An intrusion-detection system for large-scale networks,” Proc., 15th National Computer Security Conference, Baltimore, MD, Oct. 1992.
-
(1992)
Proc., 15th National Computer Security Conference
-
-
Heberlein, L.T.1
Mukherjee, B.2
Levitt, K.N.3
-
34
-
-
0027748352
-
Analysis of an algorithm for distributed recognition and accountability
-
Fairfax, VA Nov.
-
C. Ko et al., “Analysis of an algorithm for distributed recognition and accountability,” Proc., First ACM Conf. on Computer and Communications Security, Fairfax, VA, pp. 154–164, Nov. 1993.
-
(1993)
Proc., First ACM Conf. on Computer and Communications Security
, pp. 154-164
-
-
Ko, C.1
-
35
-
-
0003111439
-
Automated audit trail analysis and intrusion detection: A survey
-
Baltimore, MD Oct.
-
T. F. Lunt, “Automated audit trail analysis and intrusion detection: A survey,” Proc., 11th National Computer Security Conf., Baltimore, MD, Oct. 1988.
-
(1988)
Proc., 11th National Computer Security Conf.
-
-
Lunt, T.F.1
-
36
-
-
3943073609
-
System for Detecting Attacks on Distributed Computer Systems
-
Division of Computer Science, University of California, Davis Feb.
-
J. Brentano, An Expert System for Detecting Attacks on Distributed Computer Systems, M. S. Thesis, Division of Computer Science, University of California, Davis, Feb. 1991.
-
(1991)
M. S. Thesis
-
-
Brentano, J.1
|