-
1
-
-
0036999119
-
Therminator 2: A thermodynamics-based method for real-time patternless intrusion detection
-
Los Angeles, CA, October
-
S. Donald, R. McMillen, D. Ford, and J. McEachen. Therminator 2: A thermodynamics-based method for real-time patternless intrusion detection. In Proceedings of the IEEE Military Communications Conference (MILCOM), pages 1498-1502, Los Angeles, CA, October 2002.
-
(2002)
Proceedings of the IEEE Military Communications Conference (MILCOM)
, pp. 1498-1502
-
-
Donald, S.1
McMillen, R.2
Ford, D.3
McEachen, J.4
-
2
-
-
11144289352
-
Application of thermodynamics to the reduction of data generated by a nonstandard system
-
arXiv:condmat/0402325v1, Naval Postgraduate School Department of Physics
-
D. Ford. Application of thermodynamics to the reduction of data generated by a nonstandard system. Technical Report arXiv:condmat/0402325v1, Naval Postgraduate School Department of Physics, 2004.
-
(2004)
Technical Report
-
-
Ford, D.1
-
3
-
-
33644961664
-
1999 darpa intrusion detection evaluation: Design and procedures
-
Massachusetts Institute of Technology Lincoln Laboratory
-
J. Haines, R. Lippman, D. Fried, M. Zissman, E. Tran, and S. Boswell. 1999 darpa intrusion detection evaluation: Design and procedures. Technical report, Massachusetts Institute of Technology Lincoln Laboratory, 1999.
-
(1999)
Technical Report
-
-
Haines, J.1
Lippman, R.2
Fried, D.3
Zissman, M.4
Tran, E.5
Boswell, S.6
-
5
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
Madrid, Spain, March
-
C. Krugel, T. Toth, and E. Kirda. Service specific anomaly detection for network intrusion detection. In Proceedings of Symposium on Applied Computing (SAC), Madrid, Spain, March 2002.
-
(2002)
Proceedings of Symposium on Applied Computing (SAC)
-
-
Krugel, C.1
Toth, T.2
Kirda, E.3
-
6
-
-
1242287727
-
Low-rate tcptargeted denial of service attacks
-
Karlsruhe, Germany
-
A. Kuzmanovic and E. Knightly. Low-rate tcptargeted denial of service attacks. In Proceedings of the 2003 ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pages 75-86, Karlsruhe, Germany, 2003.
-
(2003)
Proceedings of the 2003 ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.2
-
7
-
-
11144254779
-
-
Master's thesis, Naval Postgraduate School, Monterey, CA, March
-
J. Marinovich and S. Walch. Analysis of initial and boundary conditions in therminator conversation exchange dynamics. Master's thesis, Naval Postgraduate School, Monterey, CA, March 2004.
-
(2004)
Analysis of Initial and Boundary Conditions in Therminator Conversation Exchange Dynamics
-
-
Marinovich, J.1
Walch, S.2
-
8
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
San Francisco, CA, March
-
D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In Proceedings of the IEEE INFOCOM, San Francisco, CA, March 2003.
-
(2003)
Proceedings of the IEEE INFOCOM
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
9
-
-
11144309345
-
-
Master's thesis, University of South Carolina, Columbia, SC, April
-
S. S. Mylavarapu. Detecting attacks with therminator. Master's thesis, University of South Carolina, Columbia, SC, April 2004.
-
(2004)
Detecting Attacks with Therminator
-
-
Mylavarapu, S.S.1
-
10
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24), December 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
-
-
Paxson, V.1
-
11
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc., January
-
T. Ptacek and T. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., January 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.1
Newsham, T.2
-
14
-
-
4544285697
-
Conversation exchange dynamics for real-time network monitoring and anomaly detection
-
Charlotte, NC, April
-
J. Zachary, J. McEachen, and D. Ettlich. Conversation exchange dynamics for real-time network monitoring and anomaly detection. In Proceedings of the Second IEEE International Workshop on Information Assurance, Charlotte, NC, April 2004.
-
(2004)
Proceedings of the Second IEEE International Workshop on Information Assurance
-
-
Zachary, J.1
McEachen, J.2
Ettlich, D.3
|