-
3
-
-
0028430224
-
-
1994.
-
B. Mukherjee, L.T. Heberlein, and K.N. Levitt, "Network intrusion detection," IEEE Network, vol.8, no.3, pp.26-41, 1994.
-
L.T. Heberlein, and K.N. Levitt, "Network Intrusion Detection," IEEE Network, Vol.8, No.3, Pp.26-41
-
-
Mukherjee, B.1
-
4
-
-
0023294428
-
-
1987.
-
D.E. Denning, "An intrusion-detection model," IEEE TVans. Software Engineering, vol.SE-13, no.2, pp.222-232, 1987.
-
"An Intrusion-detection Model," IEEE TVans. Software Engineering, Vol.SE-13, No.2, Pp.222-232
-
-
Denning, D.E.1
-
10
-
-
0024984013
-
-
1990 Symposium on Research in Security and Privacy, pp.296-303, 1990.
-
[10 ] L.T. Heberlein, G. Dias, K.N. Levitt, B. Mukherjee, J. Wood, and D. Wolber, "A network security monitor," Proc. 1990 Symposium on Research in Security and Privacy, pp.296-303, 1990.
-
-
-
-
11
-
-
85027127196
-
-
14th National Computer Security Conference, pp.167-176, 1991.
-
S.R. Snapp, J. Brentano, G. Dias, T.L. Goan, L.T. Heberlein, C.L. Ho, K.N. Levitt, B. Mukherjee, T. Grance, D.M. Teal, and D. Mansur, "DIDS (distributed intrusion detection system)-Motivation, architecture, and an early prototype,!' Proc. 14th National Computer Security Conference, pp.167-176, 1991.
-
J. Brentano, G. Dias, T.L. Goan, L.T. Heberlein, C.L. Ho, K.N. Levitt, B. Mukherjee, T. Grance, D.M. Teal, and D. Mansur, "DIDS (Distributed Intrusion Detection System)-Motivation, Architecture, and An Early Prototype,!' Proc.
-
-
Snapp, S.R.1
-
15
-
-
0033329099
-
-
1999.
-
M. Iguchi and S. Goto, "Detecting malicious activities through port profiling," IEICE Trans. Inf. fc Syst., vol.E82D, no.4, pp.784-792, April 1999.
-
And S. Goto, "Detecting Malicious Activities Through Port Profiling," IEICE Trans. Inf. Fc Syst., Vol.E82D, No.4, Pp.784-792, April
-
-
Iguchi, M.1
-
16
-
-
85027189714
-
-
1999.
-
[1C] S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, J. Rowe, S. Staniford-Chen, R. Yip, and D. Zerkle, "The design of GrIDS: A graph-based intrusion detection system," U.C. Davis Computer Science Department Technical Report CSE-99-2, 1999.
-
R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, J. Rowe, S. Staniford-Chen, R. Yip, and D. Zerkle, "The Design of GrIDS: A Graph-based Intrusion Detection System," U.C. Davis Computer Science Department Technical Report CSE-99-2
-
-
Cheung, S.1
-
18
-
-
85027171273
-
-
14, 1998.
-
"Butter overflows in some POP servers," CERT Advisory CA-98:08, July. 14, 1998.
-
-
-
-
22
-
-
0032682989
-
-
1999.
-
N. Kato, K. Ohta, T. Ika, G. Mansfield, and Y. Nemoto, "A proposal of event correlation for distributed network fault management and its evaluation," IEICE Trans. Commun., vol.E82-B, no.G, pp.859-8G7, June 1999.
-
K. Ohta, T. Ika, G. Mansfield, and Y. Nemoto, "A Proposal of Event Correlation for Distributed Network Fault Management and Its Evaluation," IEICE Trans. Commun., Vol.E82-B, No.G, Pp.859-8G7, June
-
-
Kato, N.1
-
28
-
-
0029392293
-
-
1995.
-
K.C. Claffy, H.-W. Braun, and G.G. Polyzos, "A param-eterizable methodology for internet traffic flow profiling," IEEE J. Select. Areas Commun., vol.13, no.8, pp.1481-1494, 1995.
-
H.-W. Braun, and G.G. Polyzos, "A Param-eterizable Methodology for Internet Traffic Flow Profiling," IEEE J. Select. Areas Commun., Vol.13, No.8, Pp.1481-1494
-
-
Claffy, K.C.1
-
31
-
-
85027121775
-
-
8, 1998.
-
"Multiple vulnerabilities in BIND," CERT Advisory CA-98:05, April 8, 1998.
-
-
-
|