-
1
-
-
1642357840
-
-
SRI International, December
-
Anderson, D., Frivold, T., Tamaru, A. and Valdes, A. (1994), NIDES: Software Users Manual: Beta-Update Release, SRI International, December, available at: www.sdl.sri.com/papers/7sri/
-
(1994)
NIDES: Software Users Manual: Beta-Update Release
-
-
Anderson, D.1
Frivold, T.2
Tamaru, A.3
Valdes, A.4
-
2
-
-
0003990308
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Banks, J., Carson, J.S. and Nelson, B.L. (1996), Discrete-Event System Simulation, Prentice-Hall, Englewood Cliffs, NJ.
-
(1996)
Discrete-Event System Simulation
-
-
Banks, J.1
Carson, J.S.2
Nelson, B.L.3
-
3
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Bass, T. (2000), "Intrusion detection systems and multisensor data fusion", Communications of the ACM, Vol. 43 No. 4, pp. 99-105.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
4
-
-
84949495645
-
A network audit system for host-based intrusion detection (NASHID) in linux
-
Daniels, T. and Spafford, E. (2000), "A network audit system for host-based intrusion detection (NASHID) in linux", Proceedings of the Annual Computer Security Applications Conference, New Orleans, LA, December.
-
(2000)
Proceedings of the Annual Computer Security Applications Conference, New Orleans, LA, December
-
-
Daniels, T.1
Spafford, E.2
-
5
-
-
2542563730
-
-
Technical Report RZ2998, IBM Research Division, Zurich Research Laboratory, Zurich, March
-
Debar, H., Dacier, M., Wespi, A. and Lampart, S. (1998), An Experimentation Workbench for Intrusion Detection Systems, Technical Report RZ2998, IBM Research Division, Zurich Research Laboratory, Zurich, March.
-
(1998)
An Experimentation Workbench for Intrusion Detection Systems
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
6
-
-
0003893616
-
-
Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA
-
Denning, D.E. and Neumann, P.G. (1985), Requirements and Model for IDES - a Real-time Intrusion Detection Expert System, Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA.
-
(1985)
Requirements and Model for IDES - A Real-time Intrusion Detection Expert System
-
-
Denning, D.E.1
Neumann, P.G.2
-
7
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst, R., Champion, T., Witten, B., Miller, E. and Spagnuolo, L. (1999), "Testing and evaluating computer intrusion detection systems", Communications of the ACM, Vol. 42, No. 7, pp. 53-61.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
9
-
-
0029716418
-
A sense of self for unix processes
-
IEEE Computer Society Press, Los Alamitos, CA
-
Forrest, S., Hofmeyr, S.A., Somayaji, A. and Longstaff, T. A. (1996), "A sense of self for Unix processes", Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA, pp. 120-8.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
10
-
-
1642263601
-
Security implications of distributed intrusion detection architectures
-
Hedbom, H., Kvarnstrom, H. and Jonsson, E. (1999), "Security implications of distributed intrusion detection architectures", Proceedings of the 4th Nordic Workshop on Secure IT Systems (NordSec99), Stockholm, November.
-
(1999)
Proceedings of the 4th Nordic Workshop on Secure IT Systems (NordSec99), Stockholm, November
-
-
Hedbom, H.1
Kvarnstrom, H.2
Jonsson, E.3
-
14
-
-
0032218214
-
Temporal sequence learning and data reduction for anomaly detection
-
ACM Special Interest Group
-
Lane, T. and Brodley, C.E. (1998), "Temporal sequence learning and data reduction for anomaly detection", Proceedings of the 5th Conference on Computer & Communications Security, San Francisco, CA, November 2-5, ACM Special Interest Group, pp. 150-8.
-
(1998)
Proceedings of the 5th Conference on Computer & Communications Security, San Francisco, CA, November 2-5
, pp. 150-158
-
-
Lane, T.1
Brodley, C.E.2
-
15
-
-
0004312378
-
-
McGraw-Hill, New York, NY
-
Law, A.M. and Kelton, W.D. (1999), Simulation Modeling and Analysis, McGraw-Hill, New York, NY.
-
(1999)
Simulation Modeling and Analysis
-
-
Law, A.M.1
Kelton, W.D.2
-
17
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
IEEE Computer Society Press, Los Alamos, CA
-
Lee, W., Stolfo, S.J. and Mok, K.W. (1999), "A data mining framework for building intrusion detection models", Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12, IEEE Computer Society Press, Los Alamos, CA, pp. 120-32.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
18
-
-
1642297682
-
Algorithm for mining audit data
-
in Lin, T.Y. (Ed.); Springer-Verlag, Berlin
-
Lee, W., Stolfo, S.J. and Mok, K.W. (2000), "Algorithm for mining audit data", in Lin, T.Y. (Ed.), Granular Computing and Data Mining, Springer-Verlag, Berlin.
-
(2000)
Granular Computing and Data Mining
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
19
-
-
1642300955
-
Real time data mining-based intrusion detection
-
Lee, W., Stolfo, S.J., Chan, P.K., Eskin Wofan, E., Miller, M., Hershkop, S. and Zhang, J. (2001), "Real time data mining-based intrusion detection", available at: www.cs.columbia.edu/ids.2001
-
(2001)
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
Eskin, W.E.4
Miller, M.5
Hershkop, S.6
Zhang, J.7
-
20
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation
-
January
-
Lippman, R.P. et al. (2000), "Evaluating intrusion detection systems: the 1998 DARPA offline intrusion detection evaluation", DISCEX 2000, January.
-
(2000)
DISCEX 2000
-
-
Lippman, R.P.1
-
21
-
-
84882749048
-
Privacy vs intrusion detection analysis
-
Lundin, E. and Jonsson, E. (1999), "Privacy vs intrusion detection analysis", Proceedings of the 2nd International Workshop on the Recent Advances in Intrusion Detection - RAID'99, West Lafayette, IN, September 7-9.
-
(1999)
Proceedings of the 2nd International Workshop on the Recent Advances in Intrusion Detection - RAID'99, West Lafayette, IN, September 7-9
-
-
Lundin, E.1
Jonsson, E.2
-
22
-
-
1642408137
-
-
Technical Report no. 02-04, Department of Computer Engineering, Chalmers University of Technology, Göteborg
-
Lundin, E. and Jonsson, E. (2002), Survey of Intrusion Detection Research, Technical Report no. 02-04, Department of Computer Engineering, Chalmers University of Technology, Göteborg.
-
(2002)
Survey of Intrusion Detection Research
-
-
Lundin, E.1
Jonsson, E.2
-
23
-
-
0004000392
-
Languages and tools for rule-based distributed intrusion detection
-
PhD thesis, Faculté Universitaire Notre de la Paix de Namur, September
-
Mounji, A. (1997), "Languages and tools for rule-based distributed intrusion detection", PhD thesis, Faculté Universitaire Notre de la Paix de Namur, September.
-
(1997)
-
-
Mounji, A.1
-
25
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Puketza, N.J., Zhang, K., Chung, M., Mukherjee, B. and Olsson, R.A. (1996), "A methodology for testing intrusion detection systems", Software Engineering, Vol. 22, No. 10, pp. 719-29.
-
(1996)
Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
26
-
-
0343472303
-
Intrusion detection, take two
-
15 November
-
Shipley, G. (1999), "Intrusion detection, take two", Network Computing, 15 November, available at: www.nwc.com/1023/1023fl.html
-
(1999)
Network Computing
-
-
Shipley, G.1
-
27
-
-
84956999446
-
The DIDS (distributed intrusion detection system) prototype
-
Snapp, S.R., Smaha, S.E., Teal, D.M. and Grance, T. (1992), "The DIDS (distributed intrusion detection system) prototype", Proceedings of the Summer USENIX Conference, pp. 227-33.
-
(1992)
Proceedings of the Summer USENIX Conference
, pp. 227-233
-
-
Snapp, S.R.1
Smaha, S.E.2
Teal, D.M.3
Grance, T.4
-
28
-
-
1642339982
-
Probabilistic alert correlation
-
Springer-Verlag, Davis, CA, October
-
Valdes, A. and Skinner, K. (2001), "Probabilistic alert correlation", Recent Advances in Intrusion Detection (RAID 2001), No. 2212 in Lecture Notes in Computer Science, Springer-Verlag, Davis, CA, October.
-
(2001)
Recent Advances in Intrusion Detection (RAID 2001), No. 2212 in Lecture Notes in Computer Science
-
-
Valdes, A.1
Skinner, K.2
|