-
2
-
-
1242340881
-
Research on mitigating the insider thread to information systems
-
RAND Corporation Report CF-163
-
Anderson R, Bozek T, Logstaff T, Meitzler W, Skroch M, Wyk KV. Research on mitigating the insider thread to information systems. Workshop Proceedings, RAND Corporation Report CF-163.
-
Workshop Proceedings
-
-
Anderson, R.1
Bozek, T.2
Logstaff, T.3
Meitzler, W.4
Skroch, M.5
Wyk, K.V.6
-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans Inform Syst Secur (TISSEC). 3:(3):2000;186-205.
-
(2000)
ACM Trans Inform Syst Secur (TISSEC)
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
8
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Debar H., Dacier M., Wespi A. Towards a taxonomy of intrusion-detection systems. Comput Netw. 31:1999;805-822.
-
(1999)
Comput Netw
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
9
-
-
25744463368
-
Confidant operational concept
-
School of Electrical Engineering and Computer Science, University of Central Florida
-
DeMara RF, Rocke AJ. Confidant operational concept. Tech. Rep. TR-RFD2003-02, School of Electrical Engineering and Computer Science, University of Central Florida; 2003.
-
(2003)
Tech. Rep.
, vol.TR-RFD2003-02
-
-
DeMara, R.F.1
Rocke, A.J.2
-
11
-
-
0001833836
-
A framework for cooperative intrusion detection
-
Frincke D.A., Tobin D., McConnell J.C., Marconi J., Polla D. A framework for cooperative intrusion detection. Proceedings of 21st NIST-NCSC National Information Systems Security Conference. 1998;361-373. Available from: http://citeseer.nj.nec.com/frincke98framework.html.
-
(1998)
Proceedings of 21st NIST-NCSC National Information Systems Security Conference
, pp. 361-373
-
-
Frincke, D.A.1
Tobin, D.2
Mcconnell, J.C.3
Marconi, J.4
Polla, D.5
-
13
-
-
84902478861
-
Policy meditation for multi-enterprise environments
-
Computer Security Applications Conference, 1999
-
Galiasso P., Bremer O., Hale J., Shenoi S., Ferraiolo D., Hu V. Policy meditation for multi-enterprise environments. Computer Security Applications Conference, 1999. (ACSAC '99) Proceedings. 1999;219-228.
-
(1999)
(ACSAC '99) Proceedings
, pp. 219-228
-
-
Galiasso, P.1
Bremer, O.2
Hale, J.3
Shenoi, S.4
Ferraiolo, D.5
Hu, V.6
-
14
-
-
0003478316
-
-
Master's thesis, Department of Computer Science, University of New Mexico; August 1990.
-
Heady R, Luger G, Maccabe A, Servilla M. The architecture of a network level intrusion detection system. Master's thesis, Department of Computer Science, University of New Mexico; August 1990.
-
(1990)
The Architecture of a Network Level Intrusion Detection System
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
17
-
-
0003615205
-
A common language for computer security incidents
-
Sandia National Laboratories; October
-
Howard JD, Longstaff TA. A common language for computer security incidents. Sandia report SAND98-8667, Sandia National Laboratories; October 1998.
-
(1998)
Sandia Report
, vol.SAND98-8667
-
-
Howard, J.D.1
Longstaff, T.A.2
-
18
-
-
1242273297
-
-
IBM Research. Aglets. http://www.trl.ibm.com/aglets.
-
Aglets
-
-
-
20
-
-
33745631135
-
Tolerating penetrations and insider attacks by requiring independent corroboration
-
ACM Press
-
Kahn C. Tolerating penetrations and insider attacks by requiring independent corroboration. Proceedings of the 1998 Workshop on New Security Paradigms. 1998;122-133 ACM Press.
-
(1998)
Proceedings of the 1998 Workshop on New Security Paradigms
, pp. 122-133
-
-
Kahn, C.1
-
22
-
-
0012624241
-
Experiences with tripwire: Using integrity checkers for intrusion detection
-
Department of Computer Sciences, Purdue University
-
Kim GH, Spafford EH. Experiences with tripwire: using integrity checkers for intrusion detection. Tech. Rep. CSD-TR-94-012, Department of Computer Sciences, Purdue University; 1994.
-
(1994)
Tech. Rep.
, vol.CSD-TR-94-012
-
-
Kim, G.H.1
Spafford, E.H.2
-
24
-
-
0042282155
-
Security in mobile agent system: Problems and approaches
-
Kun Y., Xin G., Dayou L. Security in mobile agent system: problems and approaches. ACM SIGOPS Operating Syst Rev. 34:(1):2000;21-28.
-
(2000)
ACM SIGOPS Operating Syst Rev
, vol.34
, Issue.1
, pp. 21-28
-
-
Kun, Y.1
Xin, G.2
Dayou, L.3
-
26
-
-
1242295753
-
-
Linden T. Nabou. http://www.nabou.org/en/software/nabou/.
-
Nabou
-
-
Linden, T.1
-
34
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Spafford E.H., Zamboni D. Intrusion detection using autonomous agents. Comput Netw. 34:(4):2000;547-570.
-
(2000)
Comput Netw
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
36
-
-
84905650218
-
-
WetStone Technologies, Inc. SMART Watch. http://www.wetstonetech.com/smartwatch_ns.html.
-
SMART Watch
-
-
-
37
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
White G.B., Fisch E.A., Pooch U.W. Cooperating security managers: a peer-based intrusion detection system. IEEE Netw. 1996;20-23.
-
(1996)
IEEE Netw
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
|