-
2
-
-
0025548907
-
Security Audit Trait Analysis Using Inductively Generated Predictive Rules
-
IEEE, Piscataway, N.J., March
-
H.S.Teng, K. Chen, and S.C. Lu, "Security Audit Trait Analysis Using Inductively Generated Predictive Rules," Proc. Sixth Conf. Artificial Intelligence Applications, IEEE, Piscataway, N.J., March 1990, pp. 24-29.
-
(1990)
Proc. Sixth Conf. Artificial Intelligence Applications
, pp. 24-29
-
-
Chen, H.K.1
Lu, S.C.2
-
3
-
-
0000524153
-
Intrusion Detection: Its Role and Validation
-
G. Liepens and H. Vaccaro, "Intrusion Detection: Its Role and Validation," Computers and Security, Vol. 11, 1992, pp. 347-355.
-
(1992)
Computers and Security
, vol.11
, pp. 347-355
-
-
Liepens, G.1
Vaccaro, H.2
-
4
-
-
0012292276
-
A Neural Network Approach Towards Intrusion Detection
-
Nat'l Inst. Standards and Technology, Washington, D.C.
-
K.L. Fox et al., "A Neural Network Approach Towards Intrusion Detection," Proc. 13th Nat'l Computer Security Conf., Nat'l Inst. Standards and Technology, Washington, D.C., 1990, pp. 125-134.
-
(1990)
Proc. 13th Nat'l Computer Security Conf.
, pp. 125-134
-
-
Fox, K.L.1
-
5
-
-
0028714365
-
Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring
-
IEEE Computer Soc. Press, Los Alamitos, Calif.
-
C. Ko, G. Fink, and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring," Proc. 10th Annual Computer Security Applications Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1994, pp. 134-144.
-
(1994)
Proc. 10th Annual Computer Security Applications Conf.
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
6
-
-
0028430224
-
Network Intrusion Detection
-
May-June
-
B. Mukherjee, L.T. Heberlein, and K. N. Levitt, "Network Intrusion Detection," IEEE Network, May-June 1994, pp. 26-41.
-
(1994)
IEEE Network
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
7
-
-
0003451777
-
-
tech. report, Computer Science Laboratory, SRI Int'l, Menio Park, Calif., Feb.
-
T.F. Lunt et al., A Real-Time Intrusion Detection Expert System (IDES), tech. report, Computer Science Laboratory, SRI Int'l, Menio Park, Calif., Feb. 1992.
-
(1992)
A Real-Time Intrusion Detection Expert System (IDES)
-
-
Lunt, T.F.1
-
8
-
-
3643063987
-
-
Tech. Report CSD-TR-95-009, Dept. of Computer Sciences, Purdue Univ., W. Lafayette, Ind., Mar.
-
S. Kumar and E.H. Spafford, A Software Architecture to Support Misuse Intrusion Detection, Tech. Report CSD-TR-95-009, Dept. of Computer Sciences, Purdue Univ., W. Lafayette, Ind., Mar. 1995.
-
(1995)
A Software Architecture to Support Misuse Intrusion Detection
-
-
Kumar, S.1
Spafford, E.H.2
-
9
-
-
85084162735
-
A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker
-
Usenis Assoc., Berkeley, Calif.
-
I. Goldberg et al., "A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker," 6th Usenix Security Symp., Usenis Assoc., Berkeley, Calif., 1996, pp. 1-13.
-
(1996)
6th Usenix Security Symp.
, pp. 1-13
-
-
Goldberg, I.1
|