-
1
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
August
-
S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3):186-205, August 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
4
-
-
85039378123
-
Report on statistical disclosure limitation methodology
-
Federal Committee on Statistical Methodology. Report on statistical disclosure limitation methodology (statistical policy working paper 22), 1994. http://www.fcsm.gov/working-papers/spwp22.html.
-
(1994)
Statistical Policy Working Paper
, vol.22
-
-
-
5
-
-
0003303268
-
BLT: Bi-layer tracing of HTTP and TCP/IP
-
May
-
A. Feldmann. BLT: Bi-layer tracing of HTTP and TCP/IP. In Proceedings of WWW-9, May 2000.
-
(2000)
Proceedings of WWW-9
-
-
Feldmann, A.1
-
6
-
-
84862057221
-
-
Anonymized FTP traces. http://www-nrg.ee.lbl.gov/anonymized-traces.html.
-
Anonymized FTP Traces
-
-
-
10
-
-
84958970105
-
The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
-
Lecture Notes in Computer Science. Springer-Verlag
-
R. Lippmann, S. Webster, and D. Stetson. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In Proceedings of Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Proceedings of Recent Advances in Intrusion Detection
, vol.2516
-
-
Lippmann, R.1
Webster, S.2
Stetson, D.3
-
11
-
-
0032178152
-
An extensible probe architecture for network protocol performance measurement
-
G. R. Malan and F. Jahanian. An extensible probe architecture for network protocol performance measurement. In Proceedings of ACM SIGCOMM, 1998.
-
(1998)
Proceedings of ACM SIGCOMM
-
-
Malan, G.R.1
Jahanian, F.2
-
16
-
-
0033295259
-
Bro: A system for detecting network intruders in real time
-
December
-
V. Paxson. Bro: A system for detecting network intruders in real time. Computer Networks, December 1999.
-
(1999)
Computer Networks
-
-
Paxson, V.1
-
18
-
-
1242308063
-
-
Private communication
-
S. Savage. Private communication.
-
-
-
Savage, S.1
-
19
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Oakland, CA, USA, May
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2002.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
20
-
-
84862048963
-
-
WildPackets, Inc. EtherPeek. http://www.etherpeek.com/.
-
-
-
|