-
2
-
-
0038119028
-
Hackers - Heroes of the computer revolution
-
S. Levy, "Hackers - Heroes of the Computer Revolution," Dell, 1984.
-
(1984)
Dell
-
-
Levy, S.1
-
3
-
-
0027609384
-
A survey of intrusion detection techniques
-
June
-
Lunt and F. Teresa, "A Survey of Intrusion Detection Techniques," Computers and Security 12, 4 (June 1993), pp. 405-418.
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt1
Teresa, F.2
-
5
-
-
0034247240
-
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
-
Luo, Jianxiong, and S. M. Bridges, "Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection," International Journal of Intelligent Systems, Vol. 15, No. 8, 2000, pp. 687-704
-
(2000)
International Journal of Intelligent Systems
, vol.15
, Issue.8
, pp. 687-704
-
-
Jianxiong, L.1
Bridges, S.M.2
-
7
-
-
0037781371
-
An interdisciplinary approach for adding knowledge to computer security systems
-
M. Toure, "An Interdisciplinary Approach for Adding Knowledge to Computer Security Systems," IEEE Carnahan Conference on Security Technology, 1994.
-
(1994)
IEEE Carnahan Conference on Security Technology
-
-
Toure, M.1
-
8
-
-
0027150412
-
USTAT: A real-time intrusion detection system for UNIX
-
Oakland, California, May 24-26. Los Alamitos, CA: IEEE Computer Society Press, 1993
-
Ilgun and Koral, "USTAT: A Real-time Intrusion Detection System for UNIX," Proceedings of the 1993 Computer Society Symposium on Research in Security and Privacy. Oakland, California, May 24-26, 1993. Los Alamitos, CA: IEEE Computer Society Press, 1993.
-
(1993)
Proceedings of the 1993 Computer Society Symposium on Research in Security and Privacy
-
-
Ilgun1
Koral2
-
10
-
-
0024984013
-
A network security monitor
-
May
-
L. T. Heberlein, G. V. Dias, K.N. Levitt, B. Mukherjee, J. Wood, and D. Wolber, "A Network Security Monitor," Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, May, 1990 pp. 296-303.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 296-303
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
11
-
-
0025548907
-
Security audit trail analysis using inductively generated predictive rules
-
Santa Barbara, CA, May 5-9. Los Alamitos, CA: IEEE Computer Society Press, 1990
-
H. S. Teng, K. Chen and C. Lu. Stephen, "Security Audit Trail Analysis Using Inductively Generated Predictive Rules," Sixth Conference on Artificial Intelligence Applications. Santa Barbara, CA, May 5-9, 1990. Los Alamitos, CA: IEEE Computer Society Press, 1990.
-
(1990)
Sixth Conference on Artificial Intelligence Applications
-
-
Teng, H.S.1
Chen, K.2
Stephen, C.Lu.3
-
12
-
-
0038118997
-
Computer security
-
New York, NY: John Wiley and Sons
-
Kemmerer, A. Richard, "Computer Security," Encyclopedia of Software Engineering. New York, NY: John Wiley and Sons, 1994, pp. 1153-1164.
-
(1994)
Encyclopedia of Software Engineering
, pp. 1153-1164
-
-
Kemmerer, A.R.1
-
15
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, CA 6-8 May
-
S. Forrest and T. Longstaff, "A Sense of Self for Unix Processes," Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA 6-8 May, 1996, pp.120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Longstaff, T.2
-
16
-
-
0025548907
-
Security audit trail analysis using inductively generated predictive rules
-
IEEE, IEEE Service Center, Piscataway, NJ, March
-
H. S. Teng, K. Chen and C. Lu. Stephen, "Security Audit Trail Analysis Using Inductively Generated Predictive Rules," In Proceedings of the 11th National Conference on Artificial Intelligence Applications, IEEE, IEEE Service Center, Piscataway, NJ, March 1990, pp. 24-29.
-
(1990)
Proceedings of the 11th National Conference on Artificial Intelligence Applications
, pp. 24-29
-
-
Teng, H.S.1
Chen, K.2
Stephen, C.Lu.3
-
18
-
-
84898944587
-
Intrusion detection with neural networks
-
Cambridge, MA: MIT Press
-
J. Ryan, M. J. Lin, R. Miikkulainen, "Intrusion Detection with Neural Networks," Advances in Neural Information Processing Systems 10, Cambridge, MA: MIT Press, 1998
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
20
-
-
0002365658
-
Learning program behavior profiles for intrusion detection
-
A. K. Ghosh, "Learning Program Behavior Profiles for Intrusion Detection," USENIX, 1999.
-
(1999)
USENIX
-
-
Ghosh, A.K.1
-
21
-
-
0038795927
-
Monitoring information system security
-
S. Mukkamal, G. Janoski, A. H. Sung, "Monitoring Information System Security," Proceedings of the 11th Annual Workshop on Information Technologies & Systems, pp. 139-144, 2001
-
(2001)
Proceedings of the 11th Annual Workshop on Information Technologies & Systems
, pp. 139-144
-
-
Mukkamal, S.1
Janoski, G.2
Sung, A.H.3
-
22
-
-
0038458235
-
Defending a computer system using autonomous agents
-
M. Crosbie and E. Spafford, "Defending a Computer System Using Autonomous Agents," Technical Report CSD-TR-95-022.
-
Technical Report
, vol.CSD-TR-95-022
-
-
Crosbie, M.1
Spafford, E.2
-
23
-
-
4244169431
-
Agent-based distributed learning applied to fraud detection
-
L. Prodromidis, S. J. Stolfo, "Agent-Based Distributed Learning Applied to Fraud Detection," Technical Report, CUCS-014-99.
-
Technical Report
, vol.CUCS-014-99
-
-
Prodromidis, L.1
Stolfo, S.J.2
-
25
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
S. Mukkamala, G. Janoski, A. H. Sung, "Intrusion Detection Using Neural Networks and Support Vector Machines," Proceedings of IEEE International Joint Conference on Neural Networks, pp. 1702-1707, 2002.
-
(2002)
Proceedings of IEEE International Joint Conference on Neural Networks
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.H.3
-
26
-
-
85141038051
-
Mining audit data to build intrusion detection models
-
honorable mention best application paper, August
-
W. Lee, S. J. Stolfo, and K. Mok, "Mining Audit Data to Build Intrusion Detection Models," Proc. KDD-98, honorable mention best application paper, August 1998.
-
(1998)
Proc. KDD-98
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
28
-
-
0037781361
-
Audit data reduction using neural networks and support vector machines
-
August 7-9, Syracuse University, Center for Systems Assurance
-
S. Mukkamala, A. H. Sung, "Audit Data Reduction Using Neural Networks and Support Vector Machines," Digital Forensics Research Workshop (DFRWS-2002), August 7-9, 2002, Syracuse University, Center for Systems Assurance.
-
(2002)
Digital Forensics Research Workshop (DFRWS-2002)
-
-
Mukkamala, S.1
Sung, A.H.2
-
32
-
-
0038119011
-
Distributed denial of service characterization
-
Sandia National Laboratories
-
T. Draelos, et. Al, "Distributed Denial of Service Characterization," Technical Report, Sandia National Laboratories, 2003.
-
(2003)
Technical Report
-
-
Draelos, T.1
-
36
-
-
0000671231
-
Ranking importance of input parameters of neural networks
-
A. H. Sung, "Ranking Importance of Input Parameters of Neural Networks," Expert Systems with Applications, pp.405-41, 1998.
-
(1998)
Expert Systems with Applications
, pp. 405-441
-
-
Sung, A.H.1
|