-
3
-
-
0003347648
-
Detecting information warfare attacks: Current state of the art from a process control viewpoint
-
Aug.
-
N. Ye, J. Giordano, and J. Feldman, "Detecting information warfare attacks: Current state of the art from a process control viewpoint," Communications ACM, vol. 44, Aug. 2001.
-
(2001)
Communications ACM
, vol.44
-
-
Ye, N.1
Giordano, J.2
Feldman, J.3
-
5
-
-
0032158205
-
Applying software reliability engineering in the 1990s
-
Sept.
-
W. Everett, S. Keene, and A. Nikora, "Applying software reliability engineering in the 1990s," IEEE Trans. Rel., vol. 47, pp. 372-378, Sept. 1998.
-
(1998)
IEEE Trans. Rel.
, vol.47
, pp. 372-378
-
-
Everett, W.1
Keene, S.2
Nikora, A.3
-
6
-
-
0030379933
-
Analyze-NOW - An environment for collection and analysis of failures in a network of workstations
-
Dec.
-
A. Thakur and R. K. Iyer, "Analyze-NOW - An environment for collection and analysis of failures in a network of workstations," IEEE Trans. Rel., vol. 45, no. 4, pp. 561-570, Dec. 1996.
-
(1996)
IEEE Trans. Rel.
, vol.45
, Issue.4
, pp. 561-570
-
-
Thakur, A.1
Iyer, R.K.2
-
7
-
-
0031222502
-
Proactive network-fault detection
-
Sept.
-
C. S. Hood and C. Ji, "Proactive network-fault detection," IEEE Trans. Rel., vol. 46, no. 3, pp. 333-341, Sept. 1997.
-
(1997)
IEEE Trans. Rel.
, vol.46
, Issue.3
, pp. 333-341
-
-
Hood, C.S.1
Ji, C.2
-
8
-
-
0030379361
-
Assessment of fault-detection processes: An approach based on reliability techniques
-
Dec.
-
S. Morasca, "Assessment of fault-detection processes: An approach based on reliability techniques," IEEE Trans. Rel., vol. 45, no. 4, pp. 632-637, Dec. 1996.
-
(1996)
IEEE Trans. Rel.
, vol.45
, Issue.4
, pp. 632-637
-
-
Morasca, S.1
-
9
-
-
0029508948
-
Optimal configuration of redundant real-time systems in the face of correlated failure
-
Dec.
-
C. M. Krishna, "Optimal configuration of redundant real-time systems in the face of correlated failure," IEEE Trans. Rel., vol. 44, no. 4, pp. 587-594, Dec. 1995.
-
(1995)
IEEE Trans. Rel.
, vol.44
, Issue.4
, pp. 587-594
-
-
Krishna, C.M.1
-
10
-
-
0032156812
-
Topological optimization of a reliable communication work
-
Sept.
-
S.-T. Cheng, "Topological optimization of a reliable communication work," IEEE Trans. Rel., vol. 47, no. 3, pp. 225-233, Sept. 1998.
-
(1998)
IEEE Trans. Rel.
, vol.47
, Issue.3
, pp. 225-233
-
-
Cheng, S.-T.1
-
11
-
-
0033309191
-
Design of a fault-tolerant COTS-based bus architecture
-
Dec.
-
S. N. Chau, L. Alkalai, A. T. Tai, and J. B. Burt, "Design of a fault-tolerant COTS-based bus architecture," IEEE Trans. Rel., vol. 48, no. 4, pp. 351-359, Dec. 1999.
-
(1999)
IEEE Trans. Rel.
, vol.48
, Issue.4
, pp. 351-359
-
-
Chau, S.N.1
Alkalai, L.2
Tai, A.T.3
Burt, J.B.4
-
12
-
-
0031347362
-
Optimal information-dispersal for increasing the reliability of a distributed service
-
Dec.
-
H.-M. Sun and S.-P. Shieh, "Optimal information-dispersal for increasing the reliability of a distributed service," IEEE Trans. Rel., vol. 46, no. 4, pp. 462-472, Dec. 1997.
-
(1997)
IEEE Trans. Rel.
, vol.46
, Issue.4
, pp. 462-472
-
-
Sun, H.-M.1
Shieh, S.-P.2
-
13
-
-
0033293396
-
Toward a taxonomy of intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi, "Toward a taxonomy of intrusion-detection systems," Computer Networks, vol. 31, pp. 805-822, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
14
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
IEEE Computer Society
-
R. Lippmann et al., "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," in Proc. DARPA Inform. Survivability Conf. Exposition: IEEE Computer Society, 2000, pp. 12-25.
-
(2000)
Proc. DARPA Inform. Survivability Conf. Exposition
, pp. 12-25
-
-
Lippmann, R.1
-
15
-
-
0003964874
-
Next-generation intrusion detection expert system (NIDES): A summary
-
D. Anderson, T. Frivold, and A. Valdes, "Next-generation Intrusion Detection Expert System (NIDES): A Summary," SRI International, Tech. Rep. SRI-CSL-97-07, 1995.
-
(1995)
SRI International, Tech. Rep. SRI-CSL-97-07
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
16
-
-
84860434876
-
The STAT tool suite
-
IEEE Computer Society
-
G. Vigna, S. Eckmann, and R. Kemmerer, "The STAT tool suite," in Proc. DARPA Inform. Survivability Conf. and Exposition: IEEE Computer Society, 2000, pp. 46-55.
-
(2000)
Proc. DARPA Inform. Survivability Conf. and Exposition
, pp. 46-55
-
-
Vigna, G.1
Eckmann, S.2
Kemmerer, R.3
-
17
-
-
0003518833
-
-
Ph.D. dissertation, Department of Computer Science, Purdue University, Indiana, USA
-
S. Kumar, "Classification and Detection of Computer Intrusions," Ph.D. dissertation, Department of Computer Science, Purdue University, Indiana, USA, 1995.
-
(1995)
Classification and Detection of Computer Intrusions
-
-
Kumar, S.1
-
21
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
N. Ye et al., "Probabilistic techniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man, and Cybern., vol. 31, no. 4, 2001.
-
(2001)
IEEE Trans. Syst., Man, and Cybern.
, vol.31
, Issue.4
-
-
Ye, N.1
-
22
-
-
0012129514
-
Statistical process control techniques for an intrusion detection system
-
N. Ye, S. M. Emran, X. Li, and Q. Chen, "Statistical process control techniques for an intrusion detection system," in Proc. 2nd DARPA Inform. Survivability Conf. and Exposition, 2001.
-
(2001)
Proc. 2nd DARPA Inform. Survivability Conf. and Exposition
-
-
Ye, N.1
Emran, S.M.2
Li, X.3
Chen, Q.4
-
24
-
-
0012175262
-
Computer intrusion detection based on statistical distributions of distance metrics
-
N. Ye, Q. Chen, and S. M. Emran, "Computer intrusion detection based on statistical distributions of distance metrics," in Proc. Southern Conf. Computing, 2000.
-
(2000)
Proc. Southern Conf. Computing
-
-
Ye, N.1
Chen, Q.2
Emran, S.M.3
-
28
-
-
0035271352
-
An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems
-
Mar./Apr.
-
N. Ye and Q. Chen, "An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems," Qual. Rel. Eng. Int., vol. 17, no. 2, pp. 105-112, Mar./Apr. 2001.
-
(2001)
Qual. Rel. Eng. Int.
, vol.17
, Issue.2
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
29
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning, "An intrusion-detection model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
31
-
-
0031258214
-
Computer immunology
-
Oct.
-
S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer immunology," Communications ACM, vol. 40, no. 10, pp. 88-96, Oct. 1997.
-
(1997)
Communications ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
32
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
IEEE Computer Society
-
C. Ko, G. Fink, and K. Levitt, "Execution monitoring of security-critical programs in distributed systems: A specification-based approach," in Proc. 1997 IEEE Symp. Security and Privacy: IEEE Computer Society, 1997, pp. 134-144.
-
(1997)
Proc. 1997 IEEE Symp. Security and Privacy
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
34
-
-
0004118981
-
The NIDES statistical component description of justification
-
H. S. Javitz and A. Valdes, "The NIDES statistical component description of justification," SRI International, Tech. Rep. A010, 1994.
-
(1994)
SRI International, Tech. Rep.
, vol.A010
-
-
Javitz, H.S.1
Valdes, A.2
-
35
-
-
84962306569
-
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
-
IEEE Computer Society
-
Y. Jou et al., "Design and implementation of a scalable intrusion detection system for the protection of network infrastructure," in Proc. DARPA Inform. Survivability Conf. Exposition: IEEE Computer Society, 2000, pp. 69-83.
-
(2000)
Proc. DARPA Inform. Survivability Conf. Exposition
, pp. 69-83
-
-
Jou, Y.1
-
38
-
-
0000669122
-
The exponentially weighted moving average
-
J. S. Hunter, "The exponentially weighted moving average," J. Qual. Technol., vol. 18, pp. 203-209, 1986.
-
(1986)
J. Qual. Technol.
, vol.18
, pp. 203-209
-
-
Hunter, J.S.1
-
39
-
-
84946637626
-
Control chart tests based on geometric moving averages
-
S. W. Roberts, "Control chart tests based on geometric moving averages," Technometrics, vol. 1, pp. 239-251, 1959.
-
(1959)
Technometrics
, vol.1
, pp. 239-251
-
-
Roberts, S.W.1
-
40
-
-
0000002118
-
Some statistical process control methods for autocorrelated data
-
July
-
D. C. Montgomery and C. M. Mastrangelo, "Some statistical process control methods for autocorrelated data," J. Qual. Technol., vol. 23, no. 3, pp. 179-193, July 1991.
-
(1991)
J. Qual. Technol.
, vol.23
, Issue.3
, pp. 179-193
-
-
Montgomery, D.C.1
Mastrangelo, C.M.2
-
41
-
-
0033154342
-
Robustness of the EWMA control charts to nonnormality
-
C. M. Borror, D. C. Montgomery, and C. G. Runger, "Robustness of the EWMA control charts to nonnormality," J. Qual. Technol., vol. 31, no. 3, pp. 309-316, 1999.
-
(1999)
J. Qual. Technol.
, vol.31
, Issue.3
, pp. 309-316
-
-
Borror, C.M.1
Montgomery, D.C.2
Runger, C.G.3
-
42
-
-
0032761123
-
EWMA control charts with time-varying control limits and fast initial response
-
S. H. Steiner, "EWMA control charts with time-varying control limits and fast initial response," J. Qual. Technol., vol. 31, no. 1, pp. 75-86, 1999.
-
(1999)
J. Qual. Technol.
, vol.31
, Issue.1
, pp. 75-86
-
-
Steiner, S.H.1
-
43
-
-
0001050563
-
The exponentially weighted moving variance
-
J. F. MacGregor and T. J. Harris, "The exponentially weighted moving variance," J. Qual. Technol., vol. 25, no. 1, pp. 106-118, 1993.
-
(1993)
J. Qual. Technol.
, vol.25
, Issue.1
, pp. 106-118
-
-
MacGregor, J.F.1
Harris, T.J.2
-
44
-
-
0030819313
-
Designing a multivariate EWMA control chart
-
Jan.
-
S. S. Prabhu and G. C. Runger, "Designing a multivariate EWMA control chart," J. Qual. Technol., vol. 29, no. 1, pp. 8-15, Jan. 1997.
-
(1997)
J. Qual. Technol.
, vol.29
, Issue.1
, pp. 8-15
-
-
Prabhu, S.S.1
Runger, G.C.2
|