-
3
-
-
33748184885
-
NIDX - A Real-Time Intrusion Detection Expert System
-
San Francisco, June
-
D.S. Bauer and M.E. Koblentz, "NIDX - A Real-Time Intrusion Detection Expert System," Proc. Summer Usenix, San Francisco, pp. 261-273, June 1988.
-
(1988)
Proc. Summer Usenix
, pp. 261-273
-
-
Bauer, D.S.1
Koblentz, M.E.2
-
4
-
-
33748176993
-
-
technical report, Dept. of Computer Sciences, Purdue Univ., West Lafayette, Ind.
-
M. Bishop, "Security Problems with the Unix Operating System," technical report, Dept. of Computer Sciences, Purdue Univ., West Lafayette, Ind., pp. 1-28, 1983.
-
(1983)
Security Problems with the Unix Operating System
, pp. 1-28
-
-
Bishop, M.1
-
5
-
-
0242697705
-
How to Write a Setuid Program
-
M. Bishop, "How To Write a Setuid Program," Proc. Winter Usenix, vol. 12, no. 1, pp. 5-11, 1987
-
(1987)
Proc. Winter Usenix
, vol.12
, Issue.1
, pp. 5-11
-
-
Bishop, M.1
-
6
-
-
79960166575
-
Theft of Information in the Take-Grant Protection Model
-
Franconia, N.H., June
-
M. Bishop, "Theft of Information in the Take-Grant Protection Model," Proc. Computer Security Foundations Workshop, Franconia, N.H., pp. 194-218, June 1988.
-
(1988)
Proc. Computer Security Foundations Workshop
, pp. 194-218
-
-
Bishop, M.1
-
7
-
-
33748148352
-
Insider Threat Identification Systems
-
Baltimore, Oct.
-
A.R. Clyde, "Insider Threat Identification Systems," Proc. 10th National Computer Security Conf., Baltimore, pp. 343-356, Oct. 1987.
-
(1987)
Proc. 10th National Computer Security Conf.
, pp. 343-356
-
-
Clyde, A.R.1
-
8
-
-
0023294428
-
An Intrusion Detection Model
-
Feb.
-
D.E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., vol 13, no. 2, pp. 222-226, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-226
-
-
Denning, D.E.1
-
10
-
-
0023293654
-
Design and Implementation of Secure XENIX
-
Feb.
-
V.D. Gligor et al.," Design and Implementation of Secure XENIX," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 208-221, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 208-221
-
-
Gligor, V.D.1
-
11
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection Approach
-
Mar. This paper is an extended version of two previous conference papers
-
K. Ilgun, P.A. Porras, and R.A. Kemmerer, "State Transition Analysis: A Rule-Based Intrusion Detection Approach," IEEE Trans. Software Eng., vol. 21, no. 3, pp. 181-199, Mar. 1995. (This paper is an extended version of two previous conference papers:
-
(1995)
IEEE Trans. Software Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Porras, P.A.2
Kemmerer, R.A.3
-
12
-
-
84873309550
-
Penetration State Transition Analysis: A Rule-Based Intrusion Detection Approach
-
San Antonio, Texas, Dec.
-
P.A. Porras and R.A. Kemmerer, "Penetration State Transition Analysis: A Rule-Based Intrusion Detection Approach," Proc. Eighth Ann. Computer Security Applications Conf., San Antonio, Texas, pp. 220-229, Dec. 1992;
-
(1992)
Proc. Eighth Ann. Computer Security Applications Conf.
, pp. 220-229
-
-
Porras, P.A.1
Kemmerer, R.A.2
-
13
-
-
0027150412
-
A Real-Time Intrusion Detection System for Unix
-
Oakland, Calif., May
-
K. Ilgun, "A Real-Time Intrusion Detection System for Unix," Proc. 1993 IEEE Symp. Research in Security and Privacy, Oakland, Calif., pp. 16-28, May 1993.)
-
(1993)
Proc. 1993 IEEE Symp. Research in Security and Privacy
, pp. 16-28
-
-
Ilgun, K.1
-
14
-
-
0026154682
-
The SRI Statistical Anomaly Detector
-
Oakland, Calif., May
-
H.S. Javitz and A. Valdes, "The SRI Statistical Anomaly Detector," Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., pp. 316-326, May 1991.
-
(1991)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 316-326
-
-
Javitz, H.S.1
Valdes, A.2
-
15
-
-
0023866666
-
A Prototype Real Time Intrusion Detection Expert System
-
Oakland, Calif., Apr.
-
T.F. Lunt and R. Jagannathan, "A Prototype Real Time Intrusion Detection Expert System," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 59-66, Apr. 1988.
-
(1988)
Proc. IEEE Symp. Security and Privacy
, pp. 59-66
-
-
Lunt, T.F.1
Jagannathan, R.2
-
16
-
-
0003111439
-
Automated Audit Trail Analysis and Intrusion Detection: A Survey
-
Baltimore, Oct.
-
T.F. Lunt, "Automated Audit Trail Analysis and Intrusion Detection: A Survey," Proc. 11th Nat'l Computer Security Conf., Baltimore, pp. 65-73, Oct. 1988.
-
(1988)
Proc. 11th Nat'l Computer Security Conf.
, pp. 65-73
-
-
Lunt, T.F.1
-
17
-
-
0026156486
-
A Pattern-Oriented Intrusion Detection System and Its Applications
-
Oakland, Calif., May
-
S.P. Shieh and V.D. Gligor, "A Pattern-Oriented Intrusion Detection System and Its Applications," Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., pp. 327-342, May 1991.
-
(1991)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 327-342
-
-
Shieh, S.P.1
Gligor, V.D.2
-
18
-
-
0024122965
-
Haystack: An Intrusion Detection System
-
Orlando, Fla., Dec.
-
S.E. Smaha, "Haystack: An Intrusion Detection System," Proc. Fourth Aerospace Computer Security Application Conf., Orlando, Fla., pp. 37-44, Dec. 1988.
-
(1988)
Proc. Fourth Aerospace Computer Security Application Conf.
, pp. 37-44
-
-
Smaha, S.E.1
-
19
-
-
2942645420
-
Expert Systems in Intrusion Detection: A Case Study
-
Baltimore, Oct.
-
M. Sebring, E. Shellhouse, and M. Hanna, "Expert Systems in Intrusion Detection: A Case Study," Proc. 11th Nat'l Computer Security Conf., Baltimore, pp. 74-81, Oct. 1988.
-
(1988)
Proc. 11th Nat'l Computer Security Conf.
, pp. 74-81
-
-
Sebring, M.1
Shellhouse, E.2
Hanna, M.3
-
20
-
-
0019713652
-
Theft and Conspiracy in the Take-Grant Protection Model
-
Dec.
-
L. Snyder, "Theft and Conspiracy in the Take-Grant Protection Model," J. Computer and System Sciences, vol. 23, pp. 333-347, Dec. 1981.
-
(1981)
J. Computer and System Sciences
, vol.23
, pp. 333-347
-
-
Snyder, L.1
-
21
-
-
0024984441
-
Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns
-
Oakland, Calif., May
-
S.H. Teng, K. Chen, and S.C. Lu, "Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns," Proc. IEEE Symp. Research in Security and Privacy, Oakland, Calif., pp. 278-284, May 1990.
-
(1990)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 278-284
-
-
Teng, S.H.1
Chen, K.2
Lu, S.C.3
-
22
-
-
0024665277
-
Detection of Anomalous Computer Session Activity
-
Oakland, Calif., May
-
H.S. Vaccaro and G.E. Liepins, "Detection of Anomalous Computer Session Activity," Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 280-289, May 1989.
-
(1989)
Proc. IEEE Symp. Security and Privacy
, pp. 280-289
-
-
Vaccaro, H.S.1
Liepins, G.E.2
|