-
1
-
-
0033293396
-
Towards a taxonomy of intrusion detection systems
-
Elsevier
-
H. Debar, M. Dacier and A. Wespie "Towards a Taxonomy of Intrusion Detection Systems", Computer Networks, Elsevier, Vol. 31, 1999, pp. 805-822.
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespie, A.3
-
2
-
-
0024860599
-
Knowledge based intrusion detection
-
T. F. Lunt, R. Jagannathan, R. Lee, A. Whitehurst and S. Listgarten, Knowledge based Intrusion Detection", Proceedings of Annual AI Systems in Government Conference, Washington D. C., March 1989.
-
Proceedings of Annual AI Systems in Government Conference, Washington D. C., March 1989
-
-
Lunt, T.F.1
Jagannathan, R.2
Lee, R.3
Whitehurst, A.4
Listgarten, S.5
-
5
-
-
84873309550
-
Penetration state transition analysis - A rule-based intrusion detection approach
-
IEEE Computer Society Press, November 30-December 4
-
P. A. Porras and R. A. Kemmerer, "Penetration State Transition Analysis - A Rule-Based Intrusion Detection Approach", Eight Annual Computer Security Applications Conference, IEEE Computer Society Press, November 30-December 4 1992, pp.220-229.
-
(1992)
Eight Annual Computer Security Applications Conference
, pp. 220-229
-
-
Porras, P.A.1
Kemmerer, R.A.2
-
6
-
-
0029267472
-
State transition analysis: A rule based intrusion detection system
-
Mar.
-
K. Ilgun, R. Kemmerer and P. Porras, "State Transition Analysis: A Rule Based Intrusion Detection System", IEEE Transactions on Software Engineering, Mar. 1995, 21(3).
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
7
-
-
0013348024
-
Design and implementation of a new intrusion detection approach: Property-oriented detection
-
F. Wang, F. Gong, F. S. Wu and H. Qi, "Design and Implementation of A New Intrusion Detection Approach: Property-Oriented Detection", Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, New York, June 4-5, 2001, pp. 91-99.
-
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, New York, June 4-5, 2001
, pp. 91-99
-
-
Wang, F.1
Gong, F.2
Wu, F.S.3
Qi, H.4
-
11
-
-
0003690982
-
System design document: Next generation intrusion detection expert system (NIDES). Technical report A007/A008/A009/A011/A012/A014
-
SRI International, March
-
R. Jagannathan, T. Lunt, D. Anderson, C. Dodd, F. Gilham, C. Jalali, H. Javitz, P. Neumann, A. Tamaru and A. Valdez, "System Design Document: Next Generation Intrusion Detection Expert System (NIDES). Technical Report A007/A008/A009/A011/A012/A014", SRI International, March 1993.
-
(1993)
-
-
Jagannathan, R.1
Lunt, T.2
Anderson, D.3
Dodd, C.4
Gilham, F.5
Jalali, C.6
Javitz, H.7
Neumann, P.8
Tamaru, A.9
Valdez, A.10
-
12
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
P. A. Porras and P. G. Neumann, "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances", Proceedings of the 19th National Computer Security Conference, Baltimore, MD, Oct. 1997, pp. 353-365.
-
Proceedings of the 19th National Computer Security Conference, Baltimore, MD, Oct. 1997
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
13
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
-
IEEE Computer Press
-
S. Stolfo, W. Fan, W. Lee, A. Prodromidis and P. Chan, "Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project", Proc. DARPA Information Survivability Conference and Exposition, IEEE Computer Press, 2000, pp. 130-144.
-
(2000)
Proc. DARPA Information Survivability Conference and Exposition
, pp. 130-144
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.5
-
14
-
-
84862259851
-
Market-net: Market-based protection of information systems
-
Y. Yemini, A. Dailianas, D. Florissi and G. Huberman, "Market-Net: Market-based Protection of Information Systems", Proceedings of ICE'98, First International Conference on information and Computation Economics, Charleston, SC, Oct. 1998.
-
Proceedings of ICE'98, First International Conference on Information and Computation Economics, Charleston, SC, Oct. 1998
-
-
Yemini, Y.1
Dailianas, A.2
Florissi, D.3
Huberman, G.4
-
15
-
-
0013439651
-
Intrusion modeling: Approximating computer user intentions for detection and predictions of intrustions
-
May
-
T. Spyrou and J. Darzentas, "Intrusion Modeling: Approximating Computer User Intentions for Detection and Predictions of Intrustions", Information Systems Security, May 1996, pp. 319-335.
-
(1996)
Information Systems Security
, pp. 319-335
-
-
Spyrou, T.1
Darzentas, J.2
-
17
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
T. Lane and C. E. Brodley, "Temporal Sequence Learning and Data Reduction For Anomaly Detection", ACM Transactions on Information and System Security, 2(3), 1999, pp. 295-331.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
20
-
-
0035195320
-
An analytical framework for reasoning about intrusions
-
S. Upadhyaya, R. Chinchani and K. Kwiat, "An Analytical Framework for Reasoning About Intrusions", 20th IEEE Symposium on Reliable and Distributed Systems, New Orleans, LA, USA, Oct. 2001, pp. 99-108.
-
20th IEEE Symposium on Reliable and Distributed Systems, New Orleans, LA, USA, Oct. 2001
, pp. 99-108
-
-
Upadhyaya, S.1
Chinchani, R.2
Kwiat, K.3
-
21
-
-
0006872347
-
Simulation of intrusion detection in distributed systems
-
K. Mantha, R. Chinchani, S. Upadhyaya and K. Kwiat, "Simulation of Intrusion Detection in Distributed Systems", SCS Summer Simulation Conference, July 2000.
-
SCS Summer Simulation Conference, July 2000
-
-
Mantha, K.1
Chinchani, R.2
Upadhyaya, S.3
Kwiat, K.4
-
23
-
-
0013447240
-
-
Robert Nation et. al, http://www.fvwm.org.
-
-
-
Nation, R.1
-
24
-
-
0013454142
-
-
The Open Group
-
The Open Group, http://www.opengroup.org/cde.
-
-
-
-
26
-
-
0242539799
-
Model-carrying code (MCC): A new paradigm for mobile-code security
-
R. Sekar, C. R. Ramkrishnan, I. V. Ramamkrishnan and Scott A. Smolka, "Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security", New Security Paradigms Workshop (NSPW'01), Cloudcroft, New Mexico, Sept. 2001.
-
New Security Paradigms Workshop (NSPW'01), Cloudcroft, New Mexico, Sept. 2001
-
-
Sekar, R.1
Ramkrishnan, C.R.2
Ramamkrishnan, I.V.3
Smolka, S.A.4
-
27
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
C. Ko, M. Ruschitzka and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach", IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997, pp. 175-188.
-
IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997
, pp. 175-188
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
|