-
1
-
-
0023294428
-
-
DENNING, D.E.: 'An intrusion-detection model', IEEE Trans., 1987, SE-13, pp. 222-232
-
E.: 'An Intrusion-detection Model', IEEE Trans., 1987, SE-13, Pp. 222-232
-
-
Denning, D.1
-
2
-
-
0028430224
-
-
MUKHERJEE, B., HERBERLEIN, L.T., and LEVITT, K.N.: 'Network intrusion detection', IEEE Network, 1994, pp. 26-41
-
HERBERLEIN, L.T., and LEVITT, K.N.: 'Network Intrusion Detection', IEEE Network, 1994, Pp. 26-41
-
-
Mukherjee, B.1
-
4
-
-
0028497912
-
A., SKIBO, R., and MURRAY, R.S.: 'Secure network access usine multiple applications of AT&T's smart card', AT&T Tech
-
SHERMAN, S.A., SKIBO, R., and MURRAY, R.S.: 'Secure network access usine multiple applications of AT&T's smart card', AT&T Tech. J., 1994, 73, (5), pp. 61-72
-
J., 1994, 73, (5), Pp. 61-72
-
-
Sherman, S.1
-
5
-
-
0017018484
-
-
DIFFIE, W., and HELLMAN, M.: 'New directions in cryptosraphy', IEEE Trans., 1976, IT-22, (6), pp. 644-654
-
And HELLMAN, M.: 'New Directions in Cryptosraphy', IEEE Trans., 1976, IT-22, (6), Pp. 644-654
-
-
Diffie, W.1
-
6
-
-
0017930809
-
L., SHAMIR, A., and ADLEMAN, L.: 'A method for obtaining dicital signatures and public-key cryptosystems', Comm
-
RIVEST, R.L., SHAMIR, A., and ADLEMAN, L.: 'A method for obtaining dicital signatures and public-key cryptosystems', Comm. ACM, 1978, 21, (2), pp. 120-126
-
ACM, 1978, 21, (2), Pp. 120-126
-
-
Rivest, R.1
-
7
-
-
0025386404
-
-
BURROWS, M., ABADI, M., and NEEDHAM, R.M.: 'A losic of authentication', ACM Trans., 1990, CS-8, (1), pp. 18-36
-
ABADI, M., and NEEDHAM, R.M.: 'A Losic of Authentication', ACM Trans., 1990, CS-8, (1), Pp. 18-36
-
-
Burrows, M.1
-
9
-
-
0026630927
-
-
WOO, T.Y.C., and" LAM/S.S.: 'Authentication for distributed systems', IEEE Comp., 1992, 25, (1), pp. 39-52
-
Y.C., And" LAM/S.S.: 'Authentication for Distributed Systems', IEEE Comp., 1992, 25, (1), Pp. 39-52
-
-
Woo, T.1
-
11
-
-
0026156775
-
ALLEN, P., and BLACK, S.: 'An analysis of the proxy problem in distributed systems'
-
VARADHRAJAN, V., ALLEN, P., and BLACK, S.: 'An analysis of the proxy problem in distributed systems'. IEEE Computer Society symposium on Security ami privacy, 1991, pp. 255-275
-
IEEE Computer Society Symposium on Security Ami Privacy, 1991, Pp. 255-275
-
-
Varadhrajan, V.1
-
12
-
-
0001636850
-
G., NEUMANN, B.C., and'sCHILLER, J.J.: 'Kcrberos: an authentication service for open network systems'
-
STEINER, J.G., NEUMANN, B.C., and'sCHILLER, J.J.: 'Kcrberos: an authentication service for open network systems'. Proceedings of winter USENIX conference, 1988, pp. 191-201
-
Proceedings of Winter USENIX Conference, 1988, Pp. 191-201
-
-
Steiner, J.1
-
13
-
-
33745972338
-
SAFAVI-NAINI, R., and PIEPRZYK, J.: 'Intrusion detection: a survey'
-
ESMAILI, M., SAFAVI-NAINI, R., and PIEPRZYK, J.: 'Intrusion detection: a survey'. Proceedings of 12th international conference on Computer communications, Seoul, Korea, August 1995, pp. 409-414
-
Proceedings of 12th International Conference on Computer Communications, Seoul, Korea, August 1995, Pp. 409-414
-
-
Esmaili, M.1
-
14
-
-
0029267472
-
-
ILGAN, K., KIMMERER, R.A., and PORRAS, P.A.: 'State transition analysis: a rule-based intrusion detection approach', IEEE Trans.. 1995, SE-21, (3), pp. 181-199
-
KIMMERER, R.A., and PORRAS, P.A.: 'State Transition Analysis: a Rule-based Intrusion Detection Approach', IEEE Trans.. 1995, SE-21, (3), Pp. 181-199
-
-
Ilgan, K.1
-
17
-
-
0023827998
-
S., and KOBLENTZ, M.E.: 'NIDX - An expert system for real-time network intrusion detection'
-
BAUER, D.S., and KOBLENTZ, M.E.: 'NIDX - An expert system for real-time network intrusion detection'. Proceedings of IEEE Computer network security symposium, 1988, pp. 98-106
-
Proceedings of IEEE Computer Network Security Symposium, 1988, Pp. 98-106
-
-
Bauer, D.1
-
21
-
-
0023331258
-
P.: 'An introduction to computing with neural nets', IEEE ASS T Men
-
LIPPMAN, R.P.: 'An introduction to computing with neural nets', IEEE ASS T Men;.. April 19S7, pp. 4-22
-
April 19S7, Pp. 4-22
-
-
Lippman, R.1
-
22
-
-
0003444646
-
-
RUMELHART, D.E., HINTON, O.E., and WILLIAMS, R.J.: 'Learninu internal representations by error propacation', in RUMEU1ART, D.E., and MCCLELLAND, J.L. (Eds.): 'Parallel distributed processing: explorations in the Microstructure of Concnition, Vol. 1: Foundations' (MIT Press, 19S6)_
-
E., HINTON, O.E., and WILLIAMS, R.J.: 'Learninu Internal Representations by Error Propacation', in RUMEU1ART, D.E., and MCCLELLAND, J.L. (Eds.): 'Parallel Distributed Processing: Explorations in the Microstructure of Concnition, Vol. 1: Foundations' (MIT Press, 19S6)_
-
-
Rumelhart, D.1
-
23
-
-
0020970738
-
-
BARTO, A.G., SUTTON, R.S., and ANDERSON, C.W.: 'Neuronlike elements that can solve difficult learning control problems', IEEE Trans.. 1983, SMC-13, pp. 835-846
-
G., SUTTON, R.S., and ANDERSON, C.W.: 'Neuronlike Elements that Can Solve Difficult Learning Control Problems', IEEE Trans.. 1983, SMC-13, Pp. 835-846
-
-
Barto, A.1
|