-
1
-
-
0004048154
-
Computer security, threat monitoring, and surveillance
-
James P. Andersen, Co., April
-
James P. Andersen. Computer Security, Threat Monitoring, and Surveillance. Technical report, James P. Andersen, Co., April 1980.
-
(1980)
Technical Report
-
-
Andersen, J.P.1
-
5
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, Vol. 6, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
11
-
-
85141038051
-
Mining audit data to build intrusion detection models
-
Wenke Lee, Salvator J. Stolfo, and K. Mok. Mining Audit Data to build Intrusion Detection Models. Proc. KDD-98, 1998.
-
(1998)
Proc. KDD-98
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
12
-
-
2942640996
-
Data mining for network intrusion detection
-
Paul Dokas, Levent Ertoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, and Pang-Nig Tan. Data Mining for Network Intrusion Detection. Next Generation Data Mining, 2002.
-
(2002)
Next Generation Data Mining
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevic, A.4
Srivastava, J.5
Tan, P.-N.6
-
15
-
-
0003706460
-
-
Society for Industrial and Applied Mathematics
-
E.Andersen, Z.Bai, C.Bischof, S.Blackford, J.Demmel, J.Dongarra, J.D.Croz, A.Greenbaum, S.Hammarling, A.McKenney, and D.Sorensen. LAPACK User's Guide. Society for Industrial and Applied Mathematics, 1999.
-
(1999)
LAPACK User's Guide
-
-
Andersen, E.1
Bai, Z.2
Bischof, C.3
Blackford, S.4
Demmel, J.5
Dongarra, J.6
Croz, J.D.7
Greenbaum, A.8
Hammarling, S.9
McKenney, A.10
Sorensen, D.11
-
17
-
-
0038117711
-
-
http://httpd.apache.org/.
-
-
-
-
18
-
-
0038117716
-
-
Can-2002-0840, October
-
Mitre Common Vulnerabilities Index. Can-2002-0840. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840, October 2002.
-
(2002)
-
-
-
19
-
-
0038794666
-
-
Can-2001-0925, November
-
Mitre Common Vulnerabilities Index. Can-2001-0925. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0925, November 2001.
-
(2001)
-
-
-
20
-
-
0037780080
-
-
Can-2002-0843, August
-
Mitre Common Vulnerabilities Index. Can-2002-0843. http://cve.mitre.org/cgi-bin/cvename.cgi?namesCAN-2002-0843, August 2002.
-
(2002)
-
-
-
22
-
-
0003415244
-
-
June
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Rfc 2616: Hypertext transfer protocol - http/1.1. http://www.ietf.org/rfc/rfc2616.txt, June 1999.
-
(1999)
Rfc 2616: Hypertext Transfer Protocol - http/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
|