-
1
-
-
85177140792
-
-
CERT/CC Statistics for 1988 through 1998 January 2000 CERT Coordination Center http://www.cert.org/stats/cert_stats.html
-
(2000)
-
-
-
2
-
-
85177115302
-
-
CERT Coordination Center 1998 January 2000 CERT Coordination Center http://www.cert.org/ annual_rpts/cert_rpt_98.html
-
(2000)
-
-
-
3
-
-
85177141055
-
-
Results of the Distributed-Systems Intruder Tools Workshop June 2000 CERT Coordination Center http://www.cert.org/reports/dsit_workshopfinal.html
-
(2000)
-
-
-
4
-
-
85177104860
-
-
M. Sobirey The Intrusion Detection System AID http://wwwrnks.informatik.tu-cottbus.de/~sobirey/aid.e.html
-
-
-
Sobirey, M.1
-
5
-
-
0003964874
-
Next Generation Intrusion Detection Expert System (NIDES): A Summary
-
CA, Menlo Park
-
D. Anderson T. Frivold A. Valdes Next Generation Intrusion Detection Expert System (NIDES): A Summary May 1995 CA, Menlo Park SRI-CSL-95-07 SRI International
-
(1995)
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
6
-
-
0041189147
-
Data Mining Approaches for Intrusion Detection
-
TX
-
W. Lee S. J. Stolfo Data Mining Approaches for Intrusion Detection Proceedings of the Proceedings of the 7th USENIX Security Symposium 79 94 Proceedings of the Proceedings of the 7th USENIX Security Symposium San Antonio TX 1998-January-26-29
-
(1998)
, pp. 79-94
-
-
Lee, W.1
Stolfo, S.J.2
-
7
-
-
0004204717
-
The Design of GrIDS: A Graph-Based Intrusion Detection System
-
CA, Davis
-
S. Cheung R. Crawford M. Dilger J. Frank J. Hoagland K. N. Levitt J. Rowe S. Staniford-Chen R. Yip D. Zerkle The Design of GrIDS: A Graph-Based Intrusion Detection System September 1999 CA, Davis CSE-99-2 Department of Computer Science, University of California
-
(1999)
-
-
Cheung, S.1
Crawford, R.2
Dilger, M.3
Frank, J.4
Hoagland, J.5
Levitt, K.N.6
Rowe, J.7
Staniford-Chen, S.8
Yip, R.9
Zerkle, D.10
-
8
-
-
0000231655
-
Artificial Neural Networks for Misuse Detection
-
Virginia
-
J. Cannady Artificial Neural Networks for Misuse Detection Proceedings of the 21st National Information Systems Security Conference 441 454 Proceedings of the 21st National Information Systems Security Conference Crystal City Virginia 1998-October-6-9
-
(1998)
, pp. 441-454
-
-
Cannady, J.1
-
10
-
-
27244453070
-
GASSATA, a Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis
-
L. Mé GASSATA, a Genetic Algorithm as an Alternative Tool for Security Audit Trails Analysis Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection Louvain-la-Neuve Belgium 1998-September-14-16 http://www.zurich.ibm.com/~dac/Prog_RAID98/F ull_Papers/gassata_paper.ps
-
(1998)
-
-
Mé, L.1
-
11
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
TX
-
C. Cowan C. Pu D. Maier H. Hinton P. Bakke S. Beattie A. Grier P. Wagle Q. Zhang StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks Proceedings of the 7th USENIX Security Conference Proceedings of the 7th USENIX Security Conference San Antonio TX 1998-January http://www.acsac.org/1999/papers/fri-b-1030-hinton.pdf
-
(1998)
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
12
-
-
84904154606
-
SAM: Security Adaptation Manager
-
AZ
-
H. Hinton C. Cowan L. Delcambre S. Bowers SAM: Security Adaptation Manager Proceedings of the Annual Computer Security Applications Conference Proceedings of the Annual Computer Security Applications Conference Phoenix AZ 1999-December http://www.cse.ogi.edu/DISC/projects/immunix/sa m.ps.gz
-
(1999)
-
-
Hinton, H.1
Cowan, C.2
Delcambre, L.3
Bowers, S.4
-
13
-
-
0003750241
-
An Architecture for Intrusion Detection using Autonomous Agents
-
IN, West Lafayette
-
J. Balasubramaniyan J. O. Garcia-Fernandez D. Isacoff E. H. Spafford D. M. Zamboni An Architecture for Intrusion Detection using Autonomous Agents May 1998 IN, West Lafayette 98-05 COAST Laboratory, Department of Computer Science, Purdue University
-
(1998)
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.H.4
Zamboni, D.M.5
-
14
-
-
0038458235
-
Active Defense of a Computer System using Autonomous Agents
-
IN, West Lafayette
-
M. Crosbie E. H. Spafford Active Defense of a Computer System using Autonomous Agents February 1995 IN, West Lafayette 95-008 COAST Laboratory, Department of Computer Science, Purdue University
-
(1995)
-
-
Crosbie, M.1
Spafford, E.H.2
-
15
-
-
85177116896
-
Intrusion Detection Intercomponent Adaptive Negotiation
-
Indiana
-
R. Feiertag L. Benzinger S. Rho S. Wu K. Levitt D. Peticolas M. Heckman S. Staniford-Chen C. Zhang Intrusion Detection Intercomponent Adaptive Negotiation Proceedings of the RAID 99: Recent Advances in Intrusion Detection Proceedings of the RAID 99: Recent Advances in Intrusion Detection West Lafayette USA Indiana 1999-September-7-9 http://seclab.cs.ucdavis.edu/papers/tis99.pdf
-
(1999)
-
-
Feiertag, R.1
Benzinger, L.2
Rho, S.3
Wu, S.4
Levitt, K.5
Peticolas, D.6
Heckman, M.7
Staniford-Chen, S.8
Zhang, C.9
-
16
-
-
85177132354
-
-
E. D. F. Cohen T. Berg C. Phillips V. Leung S. Chakerian An Automated, Dynamic, Flexible, Distributed, Scalable Network Defense 29 June 2000 http://www.all.net/journal/ntb/flex.html
-
(2000)
An Automated, Dynamic, Flexible, Distributed, Scalable Network Defense
-
-
Cohen, E.D.F.1
Berg, T.2
Phillips, C.3
Leung, V.4
Chakerian, S.5
-
17
-
-
85177140379
-
-
Market Engineering Marketing Strategy Award June 2000 Staff, Internet Security Systems, Inc. http://www.iss.net/cgi-bin/dbtdisplay.exe/db_data/press_rel/release/062800264.p It
-
(2000)
-
-
-
18
-
-
85177128282
-
-
Texas A&M University TX, College Station
-
E. A. Fisch Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior 1996 Texas A&M University TX, College Station
-
(1996)
-
-
Fisch, E.A.1
-
19
-
-
0029756282
-
Cooperating Security Managers: A Peerbased Intrusion Detection System
-
G. B. White E. A. Fisch U. W. Pooch Cooperating Security Managers: A Peerbased Intrusion Detection System IEEE Network 10 1 20 23 January/February 1996
-
(1996)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
20
-
-
0002629036
-
EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances
-
MD
-
P. A. Porras P. G. Neumann EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances Proceedings of the Proceedings of the 20th National Information Systems Security Conference 353 365 Proceedings of the Proceedings of the 20th National Information Systems Security Conference Baltimore MD 1997-October-7-10
-
(1997)
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
21
-
-
0002804477
-
Experience with EMERALD to Date
-
CA
-
P. G. Neumann P. A. Porras Experience with EMERALD to Date Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring Santa Clara CA 1999-April-11-12 http://www.sage.usenix.org/publications/library/pr oceedings/detection99/neumann/neumann.pdf
-
(1999)
-
-
Neumann, P.G.1
Porras, P.A.2
-
22
-
-
85177109427
-
-
M. Travers Programming with Agents: New Metaphors for Thinking about Computation 1996
-
(1996)
-
-
Travers, M.1
-
23
-
-
85177139604
-
-
T. Finin J. Weber G. Wiederhold M. Genesereth R. Fritzson D. McKay J. McGuire R. Pelavin S. Shapiro C. Beck Draft Specification of the KQML Agent-Communication Language June 2000 http://www.cs.umbc.edu/kqml/kqmlspec.ps
-
(2000)
-
-
Finin, T.1
Weber, J.2
Wiederhold, G.3
Genesereth, M.4
Fritzson, R.5
McKay, D.6
McGuire, J.7
Pelavin, R.8
Shapiro, S.9
Beck, C.10
-
24
-
-
0002248655
-
KQML as an Agent Communication Language
-
Maryland
-
T. Finin R. Fritzson D. McKay R. McEntire KQML as an Agent Communication Language Proceedings of the Third International Conference on Information and Knowledge Management 456 463 Proceedings of the Third International Conference on Information and Knowledge Management Gaithersburg Maryland 1994
-
(1994)
, pp. 456-463
-
-
Finin, T.1
Fritzson, R.2
McKay, D.3
McEntire, R.4
-
26
-
-
0345477912
-
A Methodology for using Intelligent Agents to provide Automated Intrusion Response
-
NY
-
C. A. Carver J. M. D. Hill J. R. Surdu U. W. Pooch A Methodology for using Intelligent Agents to provide Automated Intrusion Response Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop 2000 Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop West Point NY 2000-June-6-7
-
(2000)
, pp. 2000
-
-
Carver, C.A.1
Hill, J.M.D.2
Surdu, J.R.3
Pooch, U.W.4
-
27
-
-
85177131469
-
An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response
-
NY
-
C. A. Carver U. W. Pooch An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop 2000 Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop West Point NY 2000-June-6-7
-
(2000)
, pp. 2000
-
-
Carver, C.A.1
Pooch, U.W.2
|