-
1
-
-
0004048154
-
-
tech. report, James P. Anderson Co., Fort Washington, Pa
-
J.P. Anderson, Computer Security Threat Monitoring and Surveillance, tech. report, James P. Anderson Co., Fort Washington, Pa., 1980.
-
(1980)
Computer Security Threat Monitoring and Surveillance
-
-
Anderson, J.P.1
-
2
-
-
0023294428
-
An intrusion detection model
-
Feb
-
D.E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., Vol. SE-13, No. 2, Feb. 1987, pp. 222-232.
-
(1987)
IEEE Trans. Software Eng.
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
3
-
-
0003914522
-
-
Tech Report CMU/ SEI-99-TR-028, Carnegie Mellon Univ., Software Engineering Inst., Pittsburgh
-
J. Allen et al., State of the Practice of Intrusion Detection Technologies, Tech Report CMU/ SEI-99-TR-028, Carnegie Mellon Univ., Software Engineering Inst., Pittsburgh, 2000.
-
(2000)
State of the Practice of Intrusion Detection Technologies
-
-
Allen, J.1
-
4
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DAPA offline intrusion detection evaluation
-
IEEE Computer Soc. Press, Los Alamitos, Calif
-
R. Lippmann et al., "Evaluating Intrusion Detection Systems: The 1998 DAPA Offline Intrusion Detection Evaluation," Discex 2000, Vol. 2, IEEE Computer Soc. Press, Los Alamitos, Calif., 2000, pp. 12-26.
-
(2000)
Discex 2000
, vol.2
, pp. 12-26
-
-
Lippmann, R.1
-
7
-
-
0037723173
-
Got security?
-
July
-
A. Briney, "Got Security?" Information Security Magazine, Vol 2, No. 7, July 1999, pp. 20-23.
-
(1999)
Information Security Magazine
, vol.2
, Issue.7
, pp. 20-23
-
-
Briney, A.1
-
8
-
-
0038399086
-
Global security survey: Virus attack
-
July 12
-
A.K. Larson, "Global Security Survey: Virus Attack," Information Week, No. 743, July 12 1999, pp. 42-4, 48, 50, 52-3, 56.
-
(1999)
Information Week
, vol.743
, pp. 42-44
-
-
Larson, A.K.1
-
9
-
-
0343207199
-
Getting closer to policy-based intrusion detection
-
May
-
C. Boeckman, "Getting Closer to Policy-Based Intrusion Detection," Information Security Bulletin, Vol. 5, No. 4, May 2000, pp. 13-22.
-
(2000)
Information Security Bulletin
, vol.5
, Issue.4
, pp. 13-22
-
-
Boeckman, C.1
-
11
-
-
0038060791
-
A selection criteria for intrusion detection systems
-
Press, Los Alamitos, Calif
-
E. Amoroso and R. Kwapniewski, "A Selection Criteria for Intrusion Detection Systems," Proc. 14th Ann. Computer Security Applications Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1998, pp. 280-288.
-
(1998)
Proc. 14th Ann. Computer Security Applications Conf., IEEE Computer Soc.
, pp. 280-288
-
-
Amoroso, E.1
Kwapniewski, R.2
-
13
-
-
84988782496
-
The 1999 darpa offline intrusion detection evaluation
-
LNCS, Springer-Verlag, New York
-
R. Lippmann et al., "The 1999 DARPA Offline Intrusion Detection Evaluation," to be published in RAID 2000, LNCS, Springer-Verlag, New York, No. 1907.
-
RAID 2000
, Issue.1907
-
-
Lippmann, R.1
-
14
-
-
0242445762
-
The 1998 lincoln lab IDS evaluation - A critique
-
LNCS, Springer-Verlag, New York
-
J. McHugh, "The 1998 Lincoln Lab IDS Evaluation - A Critique," to be published in RAID 2000, LNCS, Springer-Verlag, New York, No. 1907, 2000.
-
(2000)
RAID 2000
, Issue.1907
-
-
McHugh, J.1
-
15
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
R. Durst et al., "Testing and Evaluating Computer Intrusion Detection Systems," Comm. ACM, Vol. 42, No. 7, 1999, pp. 53-61.
-
(1999)
Comm. ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
|