-
1
-
-
0003112690
-
Simulating concurrent intrusions for testing intrusion detection systems: Parallelizing intrusions
-
M. Chung, N. Puketza, R.A. Olsson, B. Mukherjee, "Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions," National Information Systems Security Conference, pp. 173-183, 1995.
-
(1995)
National Information Systems Security Conference
, pp. 173-183
-
-
Chung, M.1
Puketza, N.2
Olsson, R.A.3
Mukherjee, B.4
-
7
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, C. Kreibich, V. Paxson, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," 10th USENIX Security Symposium, 2001.
-
10th USENIX Security Symposium, 2001
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
8
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, A. Somayaji, "Intrusion Detection Using Sequences of System Calls," Journal of Computer Security, vol. 6, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
10
-
-
18944390941
-
The model checker spin
-
Special issue on Formal Methods in Software Practice, May
-
G.J. Holzmann, "The Model Checker Spin," IEEE Trans. on Software Engineering, Special issue on Formal Methods in Software Practice, May 1997.
-
(1997)
IEEE Trans. on Software Engineering
-
-
Holzmann, G.J.1
-
11
-
-
0003620778
-
Introduction to automata theory, languages, and computation
-
Addison-Wesley
-
J.E. Hopcroft, J.D. Ullman, Introduction to Automata Theory, Languages, and Computation, Addison-Wesley, 1979.
-
(1979)
-
-
Hopcroft, J.E.1
Ullman, J.D.2
-
13
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
T. Lane, C.E. Brodley, "Temporal Sequence Learning and Data Reduction for Anomaly Detection," ACM Trans. Information & System Security, vol. 2, no. 3, pp.295-331, 1999.
-
(1999)
ACM Trans. Information & System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
17
-
-
84944239503
-
Using finite automata to mine execution data for intrusion detection: A preliminary report
-
C. Michael, A. Ghosh, "Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report," RAID 2000, LNCS 1907, pp. 66-79, 2000.
-
(2000)
RAID 2000, LNCS 1907
, pp. 66-79
-
-
Michael, C.1
Ghosh, A.2
-
18
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
14 Dec.
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, 31 (23-24), pp.2435-2463, 14 Dec. 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
19
-
-
37249008138
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Jan.
-
T.H. Ptacek, T.N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection," Secure Networks, Jan. 1998.
-
(1998)
Secure Networks
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
20
-
-
84881225236
-
Enforceable security policies
-
Feb.
-
F. Schneider, "Enforceable security policies," ACM Transactions on Information & System Security, vol. 3, no. 1, pp.30-50, Feb. 2000.
-
(2000)
ACM Transactions on Information & System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
-
22
-
-
0037781377
-
Operating system stability and security through process homeostasis
-
Ph.D. dissertation, Univ. New Mexico, Jul.
-
A.B. Somayaji, "Operating System Stability and Security through Process Homeostasis," Ph.D. dissertation, Univ. New Mexico, Jul. 2002.
-
(2002)
-
-
Somayaji, A.B.1
-
27
-
-
84944248021
-
Intrusion detection using variable-length audit trail patterns
-
A. Wespi, M. Dacier, H. Debar, "Intrusion Detection Using Variable-Length Audit Trail Patterns," RAID 2000, LNCS 1907, pp.110-129, 2000.
-
(2000)
RAID 2000, LNCS 1907
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
|