-
1
-
-
0038755581
-
Intrusion detection: An introduction to Internet surveillance, correlation, traps, trace back, and response
-
E. Amoroso. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response. Intrusion.Net Books, 1999.
-
(1999)
Intrusion.Net Books
-
-
Amoroso, E.1
-
2
-
-
0003964874
-
Next-generation intrusion de-tection expert system (NIDES): A summary
-
Computer Science Laboratory, SRI International, Menlo Park, California, May
-
D. Anderson, T. Frivold, and A. Valdes. Next-generation intrusion de-tection expert system (NIDES): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May 1995.
-
(1995)
Technical Report SRI-CSL-95-07
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
3
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P. Anderson Company, Fort Washington, Pennsylvania, April
-
J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
4
-
-
0003907293
-
-
Macmillan Technical Publishing
-
R. Bace. Intrusion Detection. Macmillan Technical Publishing, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
6
-
-
84952309262
-
Self-aware services: Using Bayesian networks for detecting anomalies in Internet-based services
-
May
-
A. Bronstein, J. Das, M. Duro, R. Friedrich, G. Kleyner, M. Mueller, S. Singhal, and I. Cohen. Self-aware services: Using Bayesian networks for detecting anomalies in Internet-based services. In Proceedings of IFIP/IEEE International Symposium on Integrated Network Management (IM 2001), May 2001.
-
(2001)
Proceedings of IFIP/IEEE International Symposium on Integrated Network Management (IM 2001)
-
-
Bronstein, A.1
Das, J.2
Duro, M.3
Friedrich, R.4
Kleyner, G.5
Mueller, M.6
Singhal, S.7
Cohen, I.8
-
7
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables - A feasibility study
-
May
-
J. B. D. Cabrera, L. Lewis, X. Qin, W. Lee, R. K. Prasanth, B. Ravichandran, and R. K. Mehra. Proactive detection of distributed denial of service attacks using MIB traffic variables - a feasibility study. In Proceedings of IFIP/IEEE International Symposium on Integrated Network Management (IM 2001), May 2001.
-
(2001)
Proceedings of IFIP/IEEE International Symposium on Integrated Network Management (IM 2001)
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Prasanth, R.K.5
Ravichandran, B.6
Mehra, R.K.7
-
9
-
-
0008723266
-
Distributed denial of service - Trin00, tribe flood network, tribe flood network 2000, and stacheldraht
-
Department of Energy - CIAC (Computer Incident Advisory Capability), February
-
P.J. Criscuolo. Distributed denial of service - trin00, tribe flood network, tribe flood network 2000, and stacheldraht. Technical Report CIAC-2319, Department of Energy - CIAC (Computer Incident Advisory Capability), February 2000.
-
(2000)
Technical Report CIAC-2319
, vol.CIAC-2319
-
-
Criscuolo, P.J.1
-
11
-
-
0033723713
-
Iscp: Design and implementation of an inter-domain security management agent coordination protocol
-
April
-
Zhi Fu, He Huang, Tsung-Li Wu, S. Felix Wu, Fengmin Gong, Chong Xu, and Ilia Baldine. Iscp: Design and implementation of an inter-domain security management agent coordination protocol. In Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS 200), April 2000.
-
(2000)
Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS 200)
-
-
Fu, Z.1
Huang, H.2
Wu, T.-L.3
Wu, S.F.4
Gong, F.5
Xu, C.6
Baldine, I.7
-
13
-
-
4544378425
-
Adaptive network/service fault detection in transaction-oriented wide area networks
-
May
-
L. L. Ho, D. J. Cavuto, S. Papavassiliou, M. Z. Hasan, F. E. Feather, and A. G. Zawadzki. Adaptive network/service fault detection in transaction-oriented wide area networks. In Proceedings of the 6th IFIP/IEEE International Symposium on Integrated Network Management, May 1999.
-
(1999)
Proceedings of the 6th IFIP/IEEE International Symposium on Integrated Network Management
-
-
Ho, L.L.1
Cavuto, D.J.2
Papavassiliou, S.3
Hasan, M.Z.4
Feather, F.E.5
Zawadzki, A.G.6
-
14
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
18
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore MD, October
-
P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In National Information Systems Security Conference, Baltimore MD, October 1997.
-
(1997)
National Information Systems Security Conference
-
-
Porras, P.A.1
Neumann, P.G.2
-
19
-
-
0037741434
-
Using MIB II variables for network intrusion detection
-
S. Jajodia and D. Barbarã, editors. Kluwer Academic Press, March
-
X. Qin, W. Lee, L. Lewis, and J. B.D. Cabrera. Using MIB II variables for network intrusion detection. In S. Jajodia and D. Barbarã, editors, Data Mining for Security Applications, Advances in Computer Security. Kluwer Academic Press, March 2002.
-
(2002)
Data Mining for Security Applications, Advances in Computer Security
-
-
Qin, X.1
Lee, W.2
Lewis, L.3
Cabrera, J.B.D.4
|