-
3
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Department of Computer Engineering, Chalmers University, March
-
S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
-
(2000)
Technical Report
, vol.99
, Issue.15
-
-
Axelsson, S.1
-
4
-
-
0035665469
-
A comparison of intrusion detection systems
-
December
-
E. Biermann, E. Cloete and L. M. Venter, "A comparison of intrusion detection systems," Computers & Security, vol 20, no. 8, pp. 676-683, December 2001.
-
(2001)
Computers & Security
, vol.20
, Issue.8
, pp. 676-683
-
-
Biermann, E.1
Cloete, E.2
Venter, L.M.3
-
5
-
-
0024984013
-
A network security monitor
-
Los Alamitos, CA, USA
-
T. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood and D. Wolber, "A network security monitor," In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 296-304, Los Alamitos, CA, USA, 1990.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, T.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
6
-
-
0003451777
-
A real-time intrusion-detection expert system (IDES)
-
CSL, SRI International, Computer Science Laboratory, SRI International, February
-
T.F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, C. Jalali, and P.G. Neuman, "A real-time intrusion-detection expert system (IDES)," Technical Report Project 6784, CSL, SRI International, Computer Science Laboratory, SRI International, February 1992.
-
(1992)
Technical Report Project
, vol.6784
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalali, C.5
Neuman, P.G.6
-
7
-
-
0242667960
-
Detecting unusual program behavior using the statistical components of NIDES
-
SRI International, May
-
D. Anderson, T.F. Lunt, H. Javits, A. Tamaru and A. Valdes, "Detecting unusual program behavior using the statistical components of NIDES," NIDES Technical Report, SRI International, May 1995.
-
(1995)
NIDES Technical Report
-
-
Anderson, D.1
Lunt, T.F.2
Javits, H.3
Tamaru, A.4
Valdes, A.5
-
8
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, Maryland, USA, October
-
P.A. Porras and P.G. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," In Proceedings of the 20th National Information Systems Security Conference, pp. 353-365, Baltimore, Maryland, USA, October 1997.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
9
-
-
0026850007
-
A neural network component for an intrusion detection system
-
Oakland, CA, May
-
H. Debar, M. Becker and D. Siboni, "A neural network component for an intrusion detection system," In Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 240-250, Oakland, CA, May 1992.
-
(1992)
Proceedings of 1992 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
11
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows with hidden Markov model
-
S.-B. Cho and H.-J. Park, "Efficient anomaly detection by modeling privilege flows with hidden Markov model," Computers & Security, vol. 22, no. 1, pp. 45-55, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.-B.1
Park, H.-J.2
-
12
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
R. Lippmann and S. Cunningham, "improving intrusion detection performance using keyword selection and neural networks," Computer Networks, vol. 34, no. 4, pp. 594-603, 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 594-603
-
-
Lippmann, R.1
Cunningham, S.2
-
14
-
-
0242476921
-
A comparative study of anomaly detection schemes in network intrusion detection
-
May
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur and J. Srivastava, "A comparative study of anomaly detection schemes in network intrusion detection," In Proceedings of Third SIAM Conference on Data Mining, May 2003.
-
(2003)
Proceedings of Third SIAM Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
16
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
May
-
S.-B. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. on Systems, Man and Cybernetics-Part C:Applications and Reviews, vol. 32, no. 2, pp. 154-160, May 2002.
-
(2002)
IEEE Trans. on Systems, Man and Cybernetics-Part C:Applications and Reviews
, vol.32
, Issue.2
, pp. 154-160
-
-
Cho, S.-B.1
-
17
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L.R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
18
-
-
0022594196
-
An introduction to hidden Markov models
-
January
-
L.R. Rabiner and B.H. Juang, "An introduction to hidden Markov models," IEEE ASSP Magazine, pp. 4-16, January 1986.
-
(1986)
IEEE ASSP Magazine
, pp. 4-16
-
-
Rabiner, L.R.1
Juang, B.H.2
-
19
-
-
0003231931
-
The SRI IDES statistical anomaly detector
-
SRI International
-
H.S. Javitz and A. Valdes, "The SRI IDES statistical anomaly detector," NIDES Technical Report, SRI International, 1991.
-
(1991)
NIDES Technical Report
-
-
Javitz, H.S.1
Valdes, A.2
-
20
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Mitre Corporation, March
-
D.E. Bell and L.J. LaPadula, "Secure computer systems: Unified exposition and multics interpretation," Mitre Technical Report ESD-TR-75-306, Mitre Corporation, March 1976.
-
(1976)
Mitre Technical Report
, vol.ESD-TR-75-306
-
-
Bell, D.E.1
Lapadula, L.J.2
|