-
1
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection system
-
Mar.
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection system," IEEE Trans. Softw. Eng., vol. 21, pp. 181-199, Mar. 1995.
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
3
-
-
33645767146
-
Netstat: A network-based intrusion detection approach
-
G. Vigna and R. A. Kemmerer, "Netstat: A network-based intrusion detection approach," in Proc. NISSC'98, Oct. 1998, pp. 338-347.
-
Proc. NISSC'98, Oct. 1998
, pp. 338-347
-
-
Vigna, G.1
Kemmerer, R.A.2
-
4
-
-
0031258214
-
Computer immunology
-
Oct.
-
S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer immunology," Commun. ACM, vol. 40, no. 10, pp. 88-96, Oct. 1997.
-
(1997)
Commun. ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
5
-
-
0027609384
-
A survey of intrusion detection techniques
-
June
-
T. F. Lunt, "A survey of intrusion detection techniques," Comput. Security, vol. 12, no. 4, pp. 405-418, June 1993.
-
(1993)
Comput. Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
6
-
-
0002629036
-
Emerald: Event monitoring enabling responses to anomalous live disturbances
-
P. A. Porras and P. G. Neumann, "Emerald: Event monitoring enabling responses to anomalous live disturbances," in Proc. 20th NISSC, Oct. 1997, pp. 353-365.
-
Proc. 20th NISSC, Oct. 1997
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
7
-
-
0028385414
-
Fuzzy logic, neural networks, and soft computing
-
Mar.
-
L. A. Zadeh, "Fuzzy logic, neural networks, and soft computing," Commun. ACM, vol. 37, no. 3, pp. 77-84, Mar. 1994.
-
(1994)
Commun. ACM
, vol.37
, Issue.3
, pp. 77-84
-
-
Zadeh, L.A.1
-
8
-
-
84943242287
-
Solaris 2.5 Sunshield basic security module guide
-
Sunsoft, "Solaris 2.5 Sunshield basic security module guide,", 1995.
-
(1995)
-
-
Sunsoft1
-
9
-
-
0033293396
-
Toward a taxonomy of intrusion-detection systems
-
H. Deba, M. Dacier, and A. Wespi, "Toward a taxonomy of intrusion-detection systems," Comput. Networks, vol. 31, pp. 805-822, 1999.
-
(1999)
Comput. Networks
, vol.31
, pp. 805-822
-
-
Deba, H.1
Dacier, M.2
Wespi, A.3
-
10
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
Sept.
-
P. Helman and G. Liepins, "Statistical foundations of audit trail analysis for the detection of computer misuse," IEEE Trans. Softw. Eng., vol. 19, pp. 886-901, Sept. 1993.
-
(1993)
IEEE Trans. Softw. Eng.
, vol.19
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
11
-
-
85029940053
-
Foundations of intrusion detection
-
P. Helman, G. Liepins, and W. Richards, "Foundations of intrusion detection," in Proc. 1993 IEEE Symp. Research in Security and Privacy, Oakland, CA, May 1993, pp. 16-28.
-
Proc. 1993 IEEE Symp. Research in Security and Privacy, Oakland, CA, May 1993
, pp. 16-28
-
-
Helman, P.1
Liepins, G.2
Richards, W.3
-
12
-
-
0343421209
-
Next generation intrusion detection expert system (NIDES)-1. Statistical algorithms rationale-2. Rationale for proposed resolver
-
SRI International, March, Tech. Rep. A016-Rationales
-
H. Javitz et al., "Next generation intrusion detection expert system (NIDES)-1. statistical algorithms rationale-2. rationale for proposed resolver," SRI International, March, Tech. Rep. A016-Rationales, 1993.
-
(1993)
-
-
Javitz, H.1
-
14
-
-
0032218214
-
Temporal sequence learning and data reduction for anomaly detection
-
T. Lane and C. E. Brodley, "Temporal sequence learning and data reduction for anomaly detection," in Proc. ACCS'98, 1997, pp. 150-158.
-
Proc. ACCS'98, 1997
, pp. 150-158
-
-
Lane, T.1
Brodley, C.E.2
-
15
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
A. K. Ghosh, A. Schwartzbard, and M. Schatz, "Learning program behavior profiles for intrusion detection," in Proc. Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999, pp. 51-62.
-
Proc. Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999
, pp. 51-62
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
16
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: Alternative data models," in Proc. IEEE Symp. Security and Privacy, May 1999, pp. 133-145.
-
Proc. IEEE Symp. Security and Privacy, May 1999
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
17
-
-
0013439651
-
Intention modeling: Approximating computer user intentions for detection and prediction of intrusions
-
London, U.K.: Chapman & Hall, May
-
T. Spyrou and J. Darzentas, "Intention modeling: Approximating computer user intentions for detection and prediction of intrusions," in Information Systems Security. London, U.K.: Chapman & Hall, May 1996, pp. 39-335.
-
(1996)
Information Systems Security
, pp. 39-335
-
-
Spyrou, T.1
Darzentas, J.2
-
19
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb.
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, pp. 257-286, Feb. 1989.
-
(1989)
Proc. IEEE
, vol.77
, pp. 257-286
-
-
Rabiner, L.R.1
-
20
-
-
0011220965
-
Fuzzy inference systems
-
Englewood Cliffs, NJ: Prentice-Hall
-
J. S. R. Jang, "Fuzzy inference systems," in Neuro-Fuzzy and Soft Computing. Englewood Cliffs, NJ: Prentice-Hall, 1997.
-
(1997)
Neuro-Fuzzy and Soft Computing
-
-
Jang, J.S.R.1
|