-
1
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
P. D'haeseleer, S. Forrest, and P. Helman, "An immunological approach to change detection: Algorithms, analysis and implications," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 6-8, 1996, pp. 110-119.
-
Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 6-8, 1996
, pp. 110-119
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
2
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 6-8, 1996, pp. 120-128.
-
Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 6-8, 1996
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
3
-
-
0027961889
-
Self-nonself discrimination in a computer
-
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 16-18, 1994, pp. 202-212.
-
Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 16-18, 1994
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
4
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," J. Comput. Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
J. Comput. Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
5
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 14-16, 2001, pp. 130-143.
-
Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 14-16, 2001
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
6
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length n-grams
-
C. Marceau, "Characterizing the behavior of a program using multiple-length n-grams," in Proc. New Security Paradigms Workshop, Bally-cotton, Ireland, Sept. 18-22, 2000, pp. 101-110.
-
Proc. New Security Paradigms Workshop, Bally-cotton, Ireland, Sept. 18-22, 2000
, pp. 101-110
-
-
Marceau, C.1
-
7
-
-
0001760878
-
A current view of random number generators
-
L. Billard, Ed., Atlanta, GA, Mar.
-
G. Marsaglia, "A current view of random number generators," in Computer Science and Statistics: Proc. 16th Symp. Interface, L. Billard, Ed., Atlanta, GA, Mar. 1984, pp. 3-10.
-
(1984)
Computer Science and Statistics: Proc. 16th Symp. Interface
, pp. 3-10
-
-
Marsaglia, G.1
-
8
-
-
0034590432
-
Benchmarking anomaly-based detection systems
-
R. A. Maxion and K. M. C. Tan, "Benchmarking anomaly-based detection systems," in Proc. Int. Conf. Dependable Systems and Networks, New York, NY, June 25-28, 2000, pp. 623-630.
-
Proc. Int. Conf. Dependable Systems and Networks, New York, NY, June 25-28, 2000
, pp. 623-630
-
-
Maxion, R.A.1
Tan, K.M.C.2
-
9
-
-
0036472459
-
Anomaly detection in embedded systems
-
Feb.
-
____, "Anomaly detection in embedded systems," IEEE Trans. Comput., Special Issue on Embedded Fault-Tolerant Systems, vol. 51, pp. 108-120, Feb. 2002.
-
(2002)
IEEE Trans. Comput., Special Issue on Embedded Fault-Tolerant Systems
, vol.51
, pp. 108-120
-
-
Maxion, R.A.1
Tan, K.M.C.2
-
10
-
-
0002675748
-
Intrusion detection for distributed applications
-
July
-
M. Stillerman, C. Marceau, and M. Stillman, "Intrusion detection for distributed applications," Commun. ACM, vol. 42, no. 7, pp. 62-69, July 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.7
, pp. 62-69
-
-
Stillerman, M.1
Marceau, C.2
Stillman, M.3
-
11
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
in Lectures Notes in Computer Science, A. Wespi, G Vigna, and L Deri, Eds. Berlin, Germany: Springer-Verlag
-
K. M. C. Tan, K. S. Killourhy, and R. A. Maxion, "Undermining an anomaly-based intrusion detection system using common exploits," in Lectures Notes in Computer Science, A. Wespi, G Vigna, and L Deri, Eds. Berlin, Germany: Springer-Verlag, 2002, vol. 2516, Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002), pp. 54-73.
-
(2002)
Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002)
, vol.2516
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
12
-
-
0003444290
-
Computer immune systems, data sets and software: Sequence-based intrusion detection
-
Univ. New Mexico, Albuquerque. (Feb.); [Online]
-
Univ. New Mexico, Albuquerque. (Feb. 2002) Computer Immune Systems, Data Sets and Software: Sequence-Based Intrusion Detection. [Online]. Available: http://www.cs.unm.edu/~immsec/systemcalls.htm
-
(2002)
-
-
-
13
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: Alternative data models," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 9-12, 1999, pp. 133-145.
-
Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 9-12, 1999
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|