-
1
-
-
18944381640
-
Intrusion detection fly-off: Implications for the United States Navy
-
McLean, VA
-
Aguirre, S. J., W. H. Hill. 1997. Intrusion detection fly-off: Implications for the United States Navy. MITRE Technical Report MTR 97W096, McLean, VA.
-
(1997)
MITRE Technical Report
, vol.MTR 97W096
-
-
Aguirre, S.J.1
Hill, W.H.2
-
2
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Pittsburgh, PA
-
Allen, J., A. Christie, W. Fithen, J. McHugh, J. Pickel, E. Stoner. 2000. State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028 ESC-99-028, Pittsburgh, PA.
-
(2000)
Technical Report
, vol.CMU-SEI-99-TR-028 ESC-99-028
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
3
-
-
84876655613
-
As e-tailing booms on the net, so does the demand for virtual security
-
Alpert, B. 1999. As e-tailing booms on the net, so does the demand for virtual security. Barren's 79(4) 25.
-
(1999)
Barren's
, vol.79
, Issue.4
, pp. 25
-
-
Alpert, B.1
-
5
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inform. System Security 3(3) 186-205.
-
(2000)
ACM Trans. Inform. System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
7
-
-
0001049795
-
Agency research in managerial accounting: A survey
-
Baiman, S. 1982. Agency research in managerial accounting: A survey. J. Accounting Literature 1154-213.
-
(1982)
J. Accounting Literature
, vol.1
, pp. 154-213
-
-
Baiman, S.1
-
8
-
-
0002638023
-
Securing network software applications: Introduction
-
Bashir, I, E. Serafini, K. Wall. 2001. Securing network software applications: Introduction. Comm. ACM. 44(2) 28-30.
-
(2001)
Comm. ACM.
, vol.44
, Issue.2
, pp. 28-30
-
-
Bashir, I.1
Serafini, E.2
Wall, K.3
-
9
-
-
0000787258
-
Crime and punishment: An economic approach
-
Becker, G. 1968. Crime and punishment: An economic approach. J. Political Econom. 76 169-217.
-
(1968)
J. Political Econom.
, vol.76
, pp. 169-217
-
-
Becker, G.1
-
10
-
-
84876600460
-
-
CERT Security Improvement Modules, Pittsburgh, PA
-
CERT (Computer Emergency and Response Team). 2000. Detecting Signs of Intrusion. CERT Security Improvement Modules, Pittsburgh, PA.
-
(2000)
Detecting Signs of Intrusion
-
-
-
11
-
-
2542563730
-
-
IBM Zurich Laboratory, Ruschlikon, Switzerland
-
Debar, H., M. Dacier, A. Wespi, S. Lampart. 1998. A Workbench for Intrusion Detection Systems. IBM Zurich Laboratory, Ruschlikon, Switzerland.
-
(1998)
A Workbench for Intrusion Detection Systems
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
12
-
-
0023294428
-
An intrusion detection model
-
Denning, D. E. 1987. An intrusion detection model. IEEE Trans. Software Engrg. 13(2) 222-232.
-
(1987)
IEEE Trans. Software Engrg.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
13
-
-
0034430485
-
Reflections on cyberweapons controls
-
Denning, D. E. 2000. Reflections on cyberweapons controls. Comput. Security J. 16(4) 43-53.
-
(2000)
Comput. Security J.
, vol.16
, Issue.4
, pp. 43-53
-
-
Denning, D.E.1
-
14
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
D'haeseleer, P., S. Forrest, P. Helman. 1996. An immunological approach to change detection: Algorithms, analysis, and implications. Proc. IEEE Sympos. Security Privacy, 110-119.
-
(1996)
Proc. IEEE Sympos. Security Privacy
, pp. 110-119
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
15
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst, R., T. Champion, B. Witten, E. Miller, L. Spagnuolo. 1999. Testing and evaluating computer intrusion detection systems. Comm. ACM 42(7) 53-61.
-
(1999)
Comm. ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
16
-
-
0000057794
-
Optimal monitoring policies in agencies
-
Dye, R. A. 1986. Optimal monitoring policies in agencies. RAND J. Econom. 17 339-350.
-
(1986)
RAND J. Econom.
, vol.17
, pp. 339-350
-
-
Dye, R.A.1
-
18
-
-
3943113723
-
A differential games solution to a model of competition between a thief and the police
-
Feichtinger, G. 1983. A differential games solution to a model of competition between a thief and the police. Management Sci. 29 686-699.
-
(1983)
Management Sci.
, vol.29
, pp. 686-699
-
-
Feichtinger, G.1
-
19
-
-
0001936936
-
Strategic considerations in auditing
-
Fellingham, J. C., P. Newman. 1985. Strategic considerations in auditing. Accounting Rev. 60(4) 634-650.
-
(1985)
Accounting Rev.
, vol.60
, Issue.4
, pp. 634-650
-
-
Fellingham, J.C.1
Newman, P.2
-
24
-
-
84876617592
-
Hype cycle for information security
-
(May 30), Stamford, CT
-
Gartner. 2003. Hype cycle for information security. Gartner Research Report (May 30), Stamford, CT.
-
(2003)
Gartner Research Report
-
-
Gartner1
-
26
-
-
84899413556
-
The emerging consensus on criminal conduct in Cyberspace
-
Goodman, M. D., S. W. Brenner. 2002. The emerging consensus on criminal conduct in Cyberspace. UCLA J. Law Tech. (3).
-
(2002)
UCLA J. Law Tech.
, Issue.3
-
-
Goodman, M.D.1
Brenner, S.W.2
-
27
-
-
0000725056
-
Games with incomplete information played by Bayesian players, I: Basic model
-
Hansanyi, J. C. 1967. Games with incomplete information played by Bayesian players, I: Basic model. Management Sci. 14(3) 159-182.
-
(1967)
Management Sci.
, vol.14
, Issue.3
, pp. 159-182
-
-
Hansanyi, J.C.1
-
28
-
-
0000725055
-
Games with incomplete information played by Bayesian players, II: Bayesian equilibrium points
-
Hansanyi, J. C. 1968a. Games with incomplete information played by Bayesian players, II: Bayesian equilibrium points. Management Sci. 14(5) 320-334.
-
(1968)
Management Sci.
, vol.14
, Issue.5
, pp. 320-334
-
-
Hansanyi, J.C.1
-
29
-
-
0000725056
-
Games with incomplete information played by Bayesian players, III: The basic probability distribution of the game
-
Hansanyi, J. C. 1968b. Games with incomplete information played by Bayesian players, III: The basic probability distribution of the game. Management Sci. 14(7) 486-502.
-
(1968)
Management Sci.
, vol.14
, Issue.7
, pp. 486-502
-
-
Hansanyi, J.C.1
-
30
-
-
84876647994
-
Businesses keep spending on security
-
January 28
-
Hulme, H. 2002. Businesses keep spending on security. Inform. Week (January 28).
-
(2002)
Inform. Week
-
-
Hulme, H.1
-
31
-
-
0003892692
-
-
Master's thesis, Computer Science Department, University of California at Santa Barbara, CA
-
Ilgun, K. 1992. Ustat: A real-time intrusion detection system for Unix. Master's thesis, Computer Science Department, University of California at Santa Barbara, CA.
-
(1992)
Ustat: A Real-time Intrusion Detection System for Unix
-
-
Ilgun, K.1
-
32
-
-
84876623087
-
The truth about false positives
-
Internet Security Systems, Atlanta, GA
-
Internet Security Systems. 2001. The truth about false positives. Technical White Paper, Internet Security Systems, Atlanta, GA.
-
(2001)
Technical White Paper
-
-
-
34
-
-
0000217428
-
Stochastic and moral hazard
-
Kanodia, C. S. 1985. Stochastic and moral hazard. J. Accounting Res. 23 175-193.
-
(1985)
J. Accounting Res.
, vol.23
, pp. 175-193
-
-
Kanodia, C.S.1
-
35
-
-
84933492427
-
Site selection for on-site inspection in arms control
-
Kilgour, D. M. 1992. Site selection for on-site inspection in arms control. Arms Control 13(13) 439-462.
-
(1992)
Arms Control
, vol.13
, Issue.13
, pp. 439-462
-
-
Kilgour, D.M.1
-
36
-
-
84876622176
-
Who are hackers, anyway?
-
Koerner, B. I. 1999. Who are hackers, anyway? U.S. News World Rep. 17(2) 53.
-
(1999)
U.S. News World Rep.
, vol.17
, Issue.2
, pp. 53
-
-
Koerner, B.I.1
-
37
-
-
34548807057
-
A pattern matching model for misuse intrusion detection
-
Purdue University, West Lafayette, IN
-
Kumar, S., E. Spafford. 1996. A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University, West Lafayette, IN.
-
(1996)
The COAST Project
-
-
Kumar, S.1
Spafford, E.2
-
38
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee, W., W. Fan, M. Miller, S. Stolfo, E. Zadok. 2002. Toward cost-sensitive modeling for intrusion detection and response. J. Comput. Security 10(1/2) 5-22.
-
(2002)
J. Comput. Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.4
Zadok, E.5
-
39
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Lippmann, R. P., D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, M. A. Zissman. 2000a. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. Proc. 2000 DARPA Inform. Survivability Conf. Exposition (DISCEX) 2 12-26.
-
(2000)
Proc. 2000 DARPA Inform. Survivability Conf. Exposition (DISCEX)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
40
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R. P., J. W. Haines, D. J. Fried, J. Kobra, K. Das. 2000b. The 1999 DARPA off-line intrusion detection evaluation. Comput. Networks 34(2) 579-595.
-
(2000)
Comput. Networks
, vol.34
, Issue.2
, pp. 579-595
-
-
Lippmann, R.P.1
Haines, J.W.2
Fried, D.J.3
Kobra, J.4
Das, K.5
-
42
-
-
0027609384
-
A survey of intrusion detection systems
-
Lunt, T. 1993. A survey of intrusion detection systems. Comput. Security 12 405-418.
-
(1993)
Comput. Security
, vol.12
, pp. 405-418
-
-
Lunt, T.1
-
44
-
-
0003451777
-
A real-time intrusion detection expert system
-
Consumer Science Laboratory, SRI International, Menlo Park, CA
-
Lunt, T., A. Tamaru, F. Gilham, R. Jagannathan, R. C. Jalali, H. Javitz, A. Valdos, P. Neumann, T. Garvey. 1992. A real-time intrusion detection expert system. Technical report, Consumer Science Laboratory, SRI International, Menlo Park, CA.
-
(1992)
Technical Report
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalali, R.C.5
Javitz, H.6
Valdos, A.7
Neumann, P.8
Garvey, T.9
-
45
-
-
11644268379
-
A price leadership method for solving the inspector's non-constant-sum game
-
Maschler, M. 1966. A price leadership method for solving the inspector's non-constant-sum game. Naval Res. Logist. Quart. 13 11-33.
-
(1966)
Naval Res. Logist. Quart.
, vol.13
, pp. 11-33
-
-
Maschler, M.1
-
46
-
-
18944383709
-
The inspector's non-constant-sum game: Its dependence on a system of detectors
-
Maschler, M. 1967. The inspector's non-constant-sum game: Its dependence on a system of detectors. Naval Res. Logist. Quart. 14 275-290.
-
(1967)
Naval Res. Logist. Quart.
, vol.14
, pp. 275-290
-
-
Maschler, M.1
-
47
-
-
12244259566
-
-
Sun Microsystems Press, Santa Clara, CA
-
McCarthy, L. 1998. Intranet Security. Sun Microsystems Press, Santa Clara, CA.
-
(1998)
Intranet Security
-
-
McCarthy, L.1
-
48
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inform. System Security 3(4) 262-294.
-
(2000)
ACM Trans. Inform. System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
49
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
McHugh, J., A. C. Christie, J. Allen. 2000. Defending yourself: The role of intrusion detection systems. IEEE Software 17(5) 42-51.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.C.2
Allen, J.3
-
50
-
-
3543072024
-
-
NIST IR 7007, Gaithersburg, MD
-
Mell, P., V. Hu, R. Lippmann, J. Haines, M. Zissman. 2002. An Overview of Issues in Testing Intrusion Detection Systems. NIST IR 7007, Gaithersburg, MD.
-
(2002)
An Overview of Issues in Testing Intrusion Detection Systems
-
-
Mell, P.1
Hu, V.2
Lippmann, R.3
Haines, J.4
Zissman, M.5
-
51
-
-
84876595226
-
Getting the drop on network intruders
-
October 4
-
Messmer, E. 1999. Getting the drop on network intruders. Network World (October 4).
-
(1999)
Network World
-
-
Messmer, E.1
-
52
-
-
0031161247
-
Environmental regulations and incentives for compliance audits
-
Mishra, B. K., P. Newman, C. Stinson. 1997. Environmental regulations and incentives for compliance audits J. Accounting Public Policy 16(2) 187-214.
-
(1997)
J. Accounting Public Policy
, vol.16
, Issue.2
, pp. 187-214
-
-
Mishra, B.K.1
Newman, P.2
Stinson, C.3
-
54
-
-
0000028277
-
Monitoring vis-à-vis investigation in enforcement of law
-
Mookherjee, D., I. P. L. Png. 1992. Monitoring vis-à-vis investigation in enforcement of law. Amer. Econom. Rev. 82(3) 556-565.
-
(1992)
Amer. Econom. Rev.
, vol.82
, Issue.3
, pp. 556-565
-
-
Mookherjee, D.1
Png, I.P.L.2
-
55
-
-
3543130426
-
Dragon claws its way to the top
-
Mueller, P., G. Shipley. 2001. Dragon claws its way to the top. Network Comput. 20(August) 45-67.
-
(2001)
Network Comput.
, vol.20
, Issue.AUGUST
, pp. 45-67
-
-
Mueller, P.1
Shipley, G.2
-
56
-
-
18944377817
-
-
NCSC-TG-001, Version 2 June, The Rainbow Series, Meade, MD
-
National Computer Security Center. 1988. A Guide to Understanding Audit in Trusted Systems. NCSC-TG-001, Version 2 June), The Rainbow Series, Meade, MD.
-
(1988)
A Guide to Understanding Audit in Trusted Systems
-
-
-
59
-
-
0038562418
-
-
NIST Publication 800-12. National Institute of Standards and Technology, Gaithersburg, MD
-
NIST Publication 800-12. 1996. An Introduction to Computer Security. National Institute of Standards and Technology, Gaithersburg, MD.
-
(1996)
An Introduction to Computer Security
-
-
-
60
-
-
84876619171
-
Evaluating intrusion detection systems without attacking your friends
-
Northcutt, S. 1999. Evaluating intrusion detection systems without attacking your friends. Network Intrusion Detection 86.
-
(1999)
Network Intrusion Detection
, pp. 86
-
-
Northcutt, S.1
-
61
-
-
3543064959
-
-
Ed. 2. Oakwood House, Wennington, Cambridgeshire, UK (December)
-
NSS Group. 2001. Intrusion Detection Systems Group Test, Ed. 2. Oakwood House, Wennington, Cambridgeshire, UK (December).
-
(2001)
Intrusion Detection Systems Group Test
-
-
-
64
-
-
84977413772
-
The optimal trade-off between the probability and magnitude of fines
-
Polinsky, A., S. Shavell. 1979. The optimal trade-off between the probability and magnitude of fines. Amer. Econom. Rev. 69 880-891.
-
(1979)
Amer. Econom. Rev.
, vol.69
, pp. 880-891
-
-
Polinsky, A.1
Shavell, S.2
-
65
-
-
84873309550
-
Penetration state transition analysis: A rule-based intrusion detection approach
-
Conf., San Antonio, TX
-
Porras, P., R. Kemmerer. 1992. Penetration state transition analysis: A rule-based intrusion detection approach. IEEE 8th Annual Comput. Security Appl. Conf., San Antonio, TX, 220-229.
-
(1992)
IEEE 8th Annual Comput. Security Appl.
, pp. 220-229
-
-
Porras, P.1
Kemmerer, R.2
-
66
-
-
0002629036
-
Emerald: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, MD
-
Porras, P., P. Neumann. 1997. Emerald: Event monitoring enabling responses to anomalous live disturbances. Proc. 20th Nat. Inform. Systems Security Conf., Baltimore, MD, 353-365.
-
(1997)
Proc. 20th Nat. Inform. Systems Security Conf.
, pp. 353-365
-
-
Porras, P.1
Neumann, P.2
-
67
-
-
0042484572
-
CSI/FBI computer crime and security survey
-
Power, R. 2002. CSI/FBI computer crime and security survey. Comput. Security Isssues Trends 8(1) 1-22.
-
(2002)
Comput. Security Isssues Trends
, vol.8
, Issue.1
, pp. 1-22
-
-
Power, R.1
-
69
-
-
0004145058
-
-
Secure Networks Inc., Calgary, Alberta, Canada
-
Ptacek, T. H., T. N. Newsham. 1998. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Secure Networks Inc., Calgary, Alberta, Canada.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
70
-
-
3643079262
-
A software platform for testing intrusion detection systems
-
Puketza, N., M. Chung, R. O. Olsson, B. Mukherjee. 1997. A software platform for testing intrusion detection systems. IEEE Software 14(5) 43-51.
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 43-51
-
-
Puketza, N.1
Chung, M.2
Olsson, R.O.3
Mukherjee, B.4
-
71
-
-
0034204627
-
Hackers then and now: Answers to some perennial questions
-
Rothke, B. 2000. Hackers then and now: Answers to some perennial questions. Comput. Security J. 16(3) 11-14.
-
(2000)
Comput. Security J.
, vol.16
, Issue.3
, pp. 11-14
-
-
Rothke, B.1
-
72
-
-
0003883721
-
-
O'Reilly & Associates, Inc., Sebastopol, CA
-
Russell, D., G. T. Gangemi. 1992. Computer Security Basics. O'Reilly & Associates, Inc., Sebastopol, CA.
-
(1992)
Computer Security Basics
-
-
Russell, D.1
Gangemi, G.T.2
-
73
-
-
0025620699
-
Game models for structuring monitoring and enforcement systems
-
Russell, G. S. 1990. Game models for structuring monitoring and enforcement systems. Natural Resource Modeling 4 143-173.
-
(1990)
Natural Resource Modeling
, vol.4
, pp. 143-173
-
-
Russell, G.S.1
-
74
-
-
0042085672
-
Optimal pilfering policies for dynamic continuous thieves
-
Sethi, S. P. 1979. Optimal pilfering policies for dynamic continuous thieves. Management Sci. 25(6) 535-542.
-
(1979)
Management Sci.
, vol.25
, Issue.6
, pp. 535-542
-
-
Sethi, S.P.1
-
75
-
-
84935455314
-
Specific versus general enforcement of the law
-
Shavell, S. 1991. Specific versus general enforcement of the law. J. Political Econom. 99 1088-1108
-
(1991)
J. Political Econom.
, vol.99
, pp. 1088-1108
-
-
Shavell, S.1
-
77
-
-
1542386294
-
ISS RealSecure pushes past newer IDS players
-
May 17
-
Shipley, G. 1999. ISS RealSecure pushes past newer IDS players. Network Comput. (May 17).
-
(1999)
Network Comput.
-
-
Shipley, G.1
-
78
-
-
84876604153
-
Blocking virus requests in Novell bordermanager's HTTP accelerator
-
Novell Appnotes, Waltham, MA
-
Sriram, T. 2002. Blocking virus requests in Novell bordermanager's HTTP accelerator. Feature article, Novell Appnotes, Waltham, MA.
-
(2002)
Feature Article
-
-
Sriram, T.1
-
79
-
-
0000975826
-
The optimum enforcement of laws
-
Stigler, G. 1970. The optimum enforcement of laws. J. Political Econom. 78 526-536.
-
(1970)
J. Political Econom.
, vol.78
, pp. 526-536
-
-
Stigler, G.1
-
80
-
-
0000064294
-
An infiltration game with time dependent payoff
-
Thomas, M. U., Y. Nisgav. 1976. An infiltration game with time dependent payoff. Naval Res. Logist. Quart. 23 297-302.
-
(1976)
Naval Res. Logist. Quart.
, vol.23
, pp. 297-302
-
-
Thomas, M.U.1
Nisgav, Y.2
-
83
-
-
2742611322
-
Deterrence and the design of treaty verification systems
-
Weissenberger, S. 1992. Deterrence and the design of treaty verification systems. IEEE Trans. Systems, Man, Cybernetics 22 903-915.
-
(1992)
IEEE Trans. Systems, Man, Cybernetics
, vol.22
, pp. 903-915
-
-
Weissenberger, S.1
-
84
-
-
18944408167
-
Intrusion battleground evolves
-
October 8
-
Yocom, B., K. Brown. 2001. Intrusion Battleground Evolves. Network World (October 8) 53-62.
-
(2001)
Network World
, pp. 53-62
-
-
Yocom, B.1
Brown, K.2
|