-
2
-
-
84937648928
-
-
[Restricted Distribution], Dep. Comput. Sci., Purdue Univ., West Lafayette, IN, Apr.
-
M. Bishop, Security Problem with the UNIX Operating System [Restricted Distribution], Dep. Comput. Sci., Purdue Univ., West Lafayette, IN, Apr. 1982.
-
(1982)
Security Problem with the UNIX Operating System
-
-
Bishop, M.1
-
3
-
-
0024984441
-
Adaptive real-time anomaly detection using inductively generated sequential patterns
-
Oakland, CA, May
-
K. Chen, S. C. Lu, and H. S. Teng, “Adaptive real-time anomaly detection using inductively generated sequential patterns,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1990, pp. 278-295.
-
(1990)
Proc. IEEE Symp. Res. Security, Privacy
, pp. 278-295
-
-
Chen, K.1
Lu, S.C.2
Teng, H.S.3
-
4
-
-
0026850007
-
A neural network component for an intrusion detection system
-
Oakland, CA, May
-
H. Debar, M. Becker, and D. Siboni, “A neural network component for an intrusion detection system,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1992, pp. 240-258
-
(1992)
Proc. IEEE Symp. Res. Security, Privacy
, pp. 240-258
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
5
-
-
0003893616
-
-
Tech. Rep., CSL, SRI Int., Aug.
-
D. E. Denning and P. G. Neumann, “Requirements and model for IDES—A-real-time intrusion detection expert system,” Tech. Rep., CSL, SRI Int., Aug. 1985.
-
(1985)
“Requirements and model for IDES—A-real-time intrusion detection expert system,”
-
-
Denning, D.E.1
Neumann, P.G.2
-
6
-
-
84937652725
-
-
[Restricted Distribution], Comput. Sci. Dep., Univ. Calif., Santa Barbara, Apr.
-
A. V. Discolo, 4.2 BSD UNIX Security, [Restricted Distribution], Comput. Sci. Dep., Univ. Calif., Santa Barbara, Apr. 1985.
-
(1985)
4.2 BSD UNIX Security
-
-
Discolo, A.V.1
-
7
-
-
0013193905
-
The COPS security checker system
-
Anaheim, CA, June
-
D. Farmer and E. H. Spafford, “The COPS security checker system,” in Proc. Summer 1990 Usenix Conf., Anaheim, CA, June 1990, pp. 305-312.
-
(1990)
Proc. Summer 1990 Usenix Conf.
, pp. 305-312
-
-
Farmer, D.1
Spafford, E.H.2
-
8
-
-
0003685574
-
Model-based intrusion detection
-
Baltimore, MD, Oct.
-
T. D. Garvey and T. F. Lunt, “Model-based intrusion detection,” in Proc. 14th Nat. Comput. Security Conf., Baltimore, MD, Oct. 1991, pp. 372-385.
-
(1991)
Proc. 14th Nat. Comput. Security Conf.
, pp. 372-385
-
-
Garvey, T.D.1
Lunt, T.F.2
-
9
-
-
84909866474
-
-
Sytek Tech. Rep. TR-85012, Mountain View, CA, Oct.
-
L. R. Halme, T. F. Lunt, and J. Van Horne, “Analysis of computer system audit trails—Intrusion classification,” Sytek Tech. Rep. TR-85012, Mountain View, CA, Oct. 1985.
-
(1985)
“Analysis of computer system audit trails—Intrusion classification,”
-
-
Halme, L.R.1
Lunt, T.F.2
Van Horne, J.3
-
10
-
-
0344235646
-
-
Final Tech. Rep. RADC-TR-90-413, Trusted Inform. Syst., Inc., Dec.
-
B. Hubbard et al, “Computer system intrusion detection,” Final Tech. Rep. RADC-TR-90-413, Trusted Inform. Syst., Inc., Dec. 1990.
-
(1990)
“Computer system intrusion detection,”
-
-
Hubbard, B.1
-
11
-
-
0039952569
-
An expert system application for network intrusion detection
-
(Baltimore, MD), Oct.
-
K. A. Jackson, D. H. DuBois, and C. A. Stalling, “An expert system application for network intrusion detection,” in Proc. 14th Nat. Comput. Security Conf. (Baltimore, MD), Oct. 1991, pp. 215-225.
-
(1991)
Proc. 14th Nat. Comput. Security Conf.
, pp. 215-225
-
-
Jackson, K.A.1
DuBois, D.H.2
Stalling, C.A.3
-
12
-
-
0026154682
-
The SRI IDES statistical anomaly detector
-
(Oakland, CA), May
-
H. S. Javitz and A. Valdes, “The SRI IDES statistical anomaly detector,” in Proc. IEEE Res. Security, Privacy (Oakland, CA), May 1991, pp. 316-376.
-
(1991)
Proc. IEEE Res. Security, Privacy
, pp. 316-376
-
-
Javitz, H.S.1
Valdes, A.2
-
13
-
-
0003521691
-
Static analysis virus detection tools for UNIX systems
-
Baltimore, MD, Oct.
-
P. Kerchen et al., “Static analysis virus detection tools for UNIX systems,” in Proc. 13th Nat. Comput. Security Conf., Baltimore, MD, Oct. 1990, pp. 350-365.
-
(1990)
Proc. 13th Nat. Comput. Security Conf.
, pp. 350-365
-
-
Kerchen, P.1
-
14
-
-
0003892692
-
-
M.S. thesis, Comput. Sci. Dep., Univ. California, Santa Barbara, July
-
K. Ilgun, “USTAT: A real-time intrusion detection system for UNIX,” M.S. thesis, Comput. Sci. Dep., Univ. California, Santa Barbara, July 1992.
-
(1992)
“USTAT: A real-time intrusion detection system for UNIX,”
-
-
Ilgun, K.1
-
15
-
-
0027150412
-
USTAT: A real-time intrusion detection system for UNIX
-
Oakland, CA, May
-
K. Ilgun, “USTAT: A real-time intrusion detection system for UNIX,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1993, pp. 16-28.
-
(1993)
Proc. IEEE Symp. Res. Security, Privacy
, pp. 16-28
-
-
Ilgun, K.1
-
16
-
-
0003111439
-
Automated audit trail analysis and intrusion detection: A survey
-
Baltimore, MD, Oct.
-
T. F. Lunt, “Automated audit trail analysis and intrusion detection: A survey,” in Proc. 11th Nat. Comput. Security Conf., Baltimore, MD, Oct. 1988, pp. 65-73.
-
(1988)
Proc. 11th Nat. Comput. Security Conf.
, pp. 65-73
-
-
Lunt, T.F.1
-
17
-
-
3943093755
-
Real-time intrusion detection
-
San Francisco, CA, Feb.
-
T. F. Lunt, “Real-time intrusion detection,” in Proc. COMPCON, San Francisco, CA, Feb. 1989.
-
(1989)
Proc. COMPCON
-
-
Lunt, T.F.1
-
18
-
-
0024860599
-
Knowledge-based intrusion detection
-
Mar.
-
T. F. Lunt, R. Jagannathan, R. Lee, and A. Whitehurst, “Knowledge-based intrusion detection,” in Proc. 1989 AI Syst. Government Conf., Mar. 1989, pp. 102-107.
-
(1989)
Proc. 1989 AI Syst. Government Conf.
, pp. 102-107
-
-
Lunt, T.F.1
Jagannathan, R.2
Lee, R.3
Whitehurst, A.4
-
20
-
-
0003451777
-
-
Final Tech. Rep., Comput. Sci. Laboratory, SRI Int., Menlo Park, CA, Feb.
-
T. F. Lunt et al., “A real-time intrusion detection expert system (IDES),” Final Tech. Rep., Comput. Sci. Laboratory, SRI Int., Menlo Park, CA, Feb. 1992.
-
(1992)
“A real-time intrusion detection expert system (IDES),”
-
-
Lunt, T.F.1
-
22
-
-
33646029915
-
Is your computer being misused? A survey of current intrusion detection system technology
-
Dec.
-
N. J. McAuliffe et al., “Is your computer being misused? A survey of current intrusion detection system technology,” in Proc. Sixth Comput. Security Applicat. Conf., Dec. 1990, pp. 260-272.
-
(1990)
Proc. Sixth Comput. Security Applicat. Conf.
, pp. 260-272
-
-
McAuliffe, N.J.1
-
23
-
-
84937646632
-
-
presented at the Seventh Intrusion Detection Workshop, SRI Int., Menlo Park, CA, May
-
B. G. Miller and P. E. Proctor, “A requirements oriented analysis of computer misuse detection systems,” presented at the Seventh Intrusion Detection Workshop, SRI Int., Menlo Park, CA, May 1991.
-
(1991)
“A requirements oriented analysis of computer misuse detection systems,”
-
-
Miller, B.G.1
Proctor, P.E.2
-
26
-
-
33749069296
-
-
NCSC-TG-004, Version 1, Oct.
-
National Computer Security Center, Glossary of Computer Security Terms, NCSC-TG-004, Version 1, Oct. 1988.
-
(1988)
Glossary of Computer Security Terms
-
-
-
27
-
-
84937646150
-
-
CSL, SRI BN-168, Menlo Park, CA, May
-
P. G. Neumann, “A comparative anatomy of computer system/network anomaly detection systems,” CSL, SRI BN-168, Menlo Park, CA, May 1990.
-
(1990)
“A comparative anatomy of computer system/network anomaly detection systems,”
-
-
Neumann, P.G.1
-
28
-
-
84873309550
-
Penetration state transition analysis: A rule-based intrusion detection approach
-
San Antonio, TX, Dec.
-
P. A. Porras and R. A. Kemmerer, “Penetration state transition analysis: A rule-based intrusion detection approach,” in Proc. Eighth Ann. Comput. Security Applicat. Conf., San Antonio, TX, Dec. 1992, pp. 220-229.
-
(1992)
Proc. Eighth Ann. Comput. Security Applicat. Conf.
, pp. 220-229
-
-
Porras, P.A.1
Kemmerer, R.A.2
-
29
-
-
0004084716
-
-
M.S. thesis, Comput. Sci. Dep., Univ. California, Santa Barbara, June
-
P. A. Porras, “STAT—A state transition analysis tool for intrusion detection,” M.S. thesis, Comput. Sci. Dep., Univ. California, Santa Barbara, June 1992.
-
(1992)
“STAT—A state transition analysis tool for intrusion detection,”
-
-
Porras, P.A.1
-
30
-
-
2942645420
-
Expert system in intrusion detection: A case study
-
Baltimore, MD, Oct.
-
M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. A. Whitehurst, “Expert system in intrusion detection: A case study,” in Proc. 11th Nat. Comput. Security Conf., Baltimore, MD, Oct. 1988, pp. 74-81.
-
(1988)
Proc. 11th Nat. Comput. Security Conf.
, pp. 74-81
-
-
Sebring, M.M.1
Shellhouse, E.2
Hanna, M.E.3
Whitehurst, R.A.4
-
31
-
-
0026156486
-
A pattern-oriented intrusion detection model and its application
-
Oakland, CA, May
-
S. W. Shieh and V. D. Gligor, “A pattern-oriented intrusion detection model and its application,” in Proc. IEEE Res. Security, Privacy, Oakland, CA, May 1991, pp. 327-342.
-
(1991)
Proc. IEEE Res. Security, Privacy
, pp. 327-342
-
-
Shieh, S.W.1
Gligor, V.D.2
-
33
-
-
84941476194
-
-
Virtual VAX-11 Version, Comput. Sci. Div., Dep. Elec., Comput. Sci., Univ. California, Berkeley, Aug.
-
UNIX Programmer's Manual, 4.2 Berkeley Software Distribution, Virtual VAX-11 Version, Comput. Sci. Div., Dep. Elec., Comput. Sci., Univ. California, Berkeley, Aug. 1983.
-
(1983)
UNIX Programmer's Manual, 4.2 Berkeley Software Distribution
-
-
-
34
-
-
0024665277
-
Detection of anomalous computer session activity
-
Oakland, CA, May
-
H. S. Vaccaro and G. E. Liepins, “Detection of anomalous computer session activity,” in Proc. IEEE Symp. Res. Security, Privacy, Oakland, CA, May 1989, pp. 280-289.
-
(1989)
Proc. IEEE Symp. Res. Security, Privacy
, pp. 280-289
-
-
Vaccaro, H.S.1
Liepins, G.E.2
|