-
4
-
-
0346482196
-
Building big brother
-
Jan.
-
B. Simons, "Building big brother," Commun. ACM, vol. 43, no. 1, pp. 31-32, Jan. 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.1
, pp. 31-32
-
-
Simons, B.1
-
5
-
-
85001840137
-
Risks of insiders
-
Dec.
-
P. G. Neumann, "Risks of insiders," Commun. ACM, vol. 42, no. 12, p. 160, Dec. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 160
-
-
Neumann, P.G.1
-
6
-
-
0006890506
-
Net to worry
-
Dec.
-
M. Godwin, "Net to worry," Commun. ACM, vol. 42, no. 12, pp. 15-17, Dec. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 15-17
-
-
Godwin, M.1
-
7
-
-
0344614689
-
Surviving information warfare attacks
-
Apr.
-
S. Jajodia, P. Ammann, and C. D. McCollum, "Surviving information warfare attacks," Computer, vol. 32, no. 3, pp. 57-63, Apr. 1999.
-
(1999)
Computer
, vol.32
, Issue.3
, pp. 57-63
-
-
Jajodia, S.1
Ammann, P.2
McCollum, C.D.3
-
8
-
-
0006890846
-
Pentagon confronts mounting cyber risks
-
Mar.
-
P. Mann, "Pentagon confronts mounting cyber risks," Aviation Week and Space Technology, vol. 150, no. 12, pp. 82-83, Mar. 1999.
-
(1999)
Aviation Week and Space Technology
, vol.150
, Issue.12
, pp. 82-83
-
-
Mann, P.1
-
9
-
-
85008030889
-
Computer security research: A British perspective
-
Sept./Oct.
-
B. H. Barnes, "Computer security research: A British perspective," IEEE Software, vol. 15, no. 4, pp. 30-33, Sept./Oct., 1998.
-
(1998)
IEEE Software
, vol.15
, Issue.4
, pp. 30-33
-
-
Barnes, B.H.1
-
10
-
-
0031673674
-
Catapults and grappling hooks: The tools and techniques of information warfare
-
A. Boulanger, "Catapults and grappling hooks: The tools and techniques of information warfare," IBM Systems J, vol. 37, no. 1, pp. 106-114, 1998.
-
(1998)
IBM Systems J
, vol.37
, Issue.1
, pp. 106-114
-
-
Boulanger, A.1
-
11
-
-
0033293396
-
Toward a taxonomy of intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi, "Toward a taxonomy of intrusion-detection systems," Computer Networks, vol. 31, pp. 805-822, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
12
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R. Lippmann et al., "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," in Proc. DARPA Information Survivability Conf. & Exposition, Jan. 2000, pp. 12-26.
-
Proc. DARPA Information Survivability Conf. & Exposition, Jan. 2000
, pp. 12-26
-
-
Lippmann, R.1
-
14
-
-
0347742772
-
Intrusion detection systems and multi-sensor data fusion
-
Apr.
-
T. Bass, "Intrusion detection systems and multi-sensor data fusion," Commun. ACM, vol. 43, no. 3, pp. 99-105, Apr. 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.3
, pp. 99-105
-
-
Bass, T.1
-
15
-
-
0002675748
-
Intrusion detection for distributed applications
-
July
-
M. Stillerman, C. Marceau, and M. Stillman, "Intrusion detection for distributed applications," Commun. ACM, vol. 42, no. 6, pp. 62-69, July 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.6
, pp. 62-69
-
-
Stillerman, M.1
Marceau, C.2
Stillman, M.3
-
17
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
P. A. Porras and P. G. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," in Proc. NISSC, Oct. 1997.
-
Proc. NISSC, Oct. 1997
-
-
Porras, P.A.1
Neumann, P.G.2
-
25
-
-
0003518833
-
Classification and detection of computer intrusions
-
Ph.D. Dissertation, Dept. Computer Science, Purdue University
-
S. Kumar, "Classification and Detection of Computer Intrusions," Ph.D. Dissertation, Dept. Computer Science, Purdue University, 1995.
-
(1995)
-
-
Kumar, S.1
-
27
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
C. Ko, G. Fink, and K. Levitt, "Execution monitoring of security-critical programs in distributed systems: A specification-based approach," in Proc. 1997 IEEE Symp. Security and Privacy, pp. 134-144.
-
Proc. 1997 IEEE Symp. Security and Privacy
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
29
-
-
84962259930
-
Building survivable systems: An integrated approach based on intrusion detection and damage containment
-
T. Bowen et al., "Building survivable systems: An integrated approach based on intrusion detection and damage containment," in Proc. 2000 DARPA Information Survivability Conf. Exposition, vol. II, pp. 84-99.
-
Proc. 2000 DARPA Information Survivability Conf. Exposition
, vol.2
, pp. 84-99
-
-
Bowen, T.1
-
30
-
-
0023294428
-
An intrusion-detection model
-
Feb.
-
D. E. Denning, "An intrusion-detection model," IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
31
-
-
0003964874
-
Next-generation intrusion detection expert system (NIDES): A summary
-
Menlo Park, CA, Technical Report SRI-CSL-97-07, May; SRI Int'l.
-
D. Anderson, T. Frivold, and A. Valdes, "Next-Generation Intrusion Detection Expert System (NIDES): A Summary,", Menlo Park, CA, Technical Report SRI-CSL-97-07, May 1995. SRI Int'l.
-
(1995)
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
33
-
-
0004118981
-
The NIDES statistical component description of justification
-
Menlo Park, CA, Technical Report A010, Mar.; SRI Int'l.
-
____, "The NIDES Statistical Component Description of Justification,", Menlo Park, CA, Technical Report A010, Mar. 1994. SRI Int'l.
-
(1994)
-
-
Javitz, H.S.1
Valdes, A.2
-
34
-
-
84962306569
-
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
-
Y. Jou et al., "Design and implementation of a scalable intrusion detection system for the protection of network infrastructure," in Proc. 2000 DARPA Information Survivability Conf. Exposition, pp. 69-83.
-
Proc. 2000 DARPA Information Survivability Conf. Exposition
, pp. 69-83
-
-
Jou, Y.1
-
39
-
-
0031258214
-
Computer immunology
-
Oct.
-
S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer immunology," Commun. ACM, vol. 40, no. 9, pp. 88-96, Oct., 1997.
-
(1997)
Commun. ACM
, vol.40
, Issue.9
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
40
-
-
84958752009
-
Fixed vs. variable-length patterns for detecting suspicious process behavior
-
H. Debar, M. Dacier, M. Nassehi, and A. Wespi, "Fixed vs. variable-length patterns for detecting suspicious process behavior," in 1998 Proc. European Symp. Research in Computer Security, pp. 1-15.
-
1998 Proc. European Symp. Research in Computer Security
, pp. 1-15
-
-
Debar, H.1
Dacier, M.2
Nassehi, M.3
Wespi, A.4
-
42
-
-
0012297627
-
Computer intrusion detection based on bayes factors for comparing command transition probabilities
-
National Institute of Statistical Sciences
-
W. DuMouchel. Computer Intrusion Detection Based on Bayes factors for Comparing Command Transition Probabilities. National Institute of Statistical Sciences. [Online]. Available: http://www.niss.org/downloadabletechreports.html
-
-
-
DuMouchel, W.1
-
43
-
-
0012291134
-
A hybrid high-order Markov-chain model for computer intrusion detection
-
National Institute of Statistical Sciences
-
W.-H. Ju and Y. Vardi. A Hybrid High-Order Markov-Chain Model for Computer Intrusion Detection. National Institute of Statistical Sciences. [Online]. Available: http://www.niss.org/downloadabletechreports.html
-
-
-
Ju, W.-H.1
Vardi, Y.2
-
44
-
-
1942443747
-
Computer intrusion: Detecting masquerades
-
National Inst. of Statistical Sciences
-
M. Schonlau et al. Computer Intrusion: Detecting Masquerades. National Inst. of Statistical Sciences. [Online]. Available: http://www.niss.org/downloadabletechreports.html
-
-
-
Schonlau, M.1
-
45
-
-
0006889822
-
Detecting network intrusion using a Markov modulated nonhomogeneous poisson process
-
S. L. Scott, Detecting Network Intrusion Using a Markov Modulated Nonhomogeneous Poisson Process.
-
-
-
Scott, S.L.1
-
47
-
-
1942539893
-
A comparison of test statistics for computer intrusion detection based on principal components regression of transition probabilities
-
W. DuMouchel and M. Schonlau, "A comparison of test statistics for computer intrusion detection based on principal components regression of transition probabilities," in Proc. #30 Symp. Interface: Computing Science and Statistics.
-
Proc. #30 Symp. Interface: Computing Science and Statistics
-
-
DuMouchel, W.1
Schonlau, M.2
-
48
-
-
1942539890
-
Cyber attack detection through a Markov-chain model of computer event transitions
-
submitted
-
N. Ye, Cyber attack detection through a Markov-chain model of computer event transitions, in IEEE Trans. Systems, Man and Cybernetics. submitted.
-
IEEE Trans. Systems, Man and Cybernetics
-
-
Ye, N.1
-
55
-
-
1942475925
-
EWMA techniques for detecting computer intrusions through anomalous changes in event intensity
-
Mar.
-
N. Ye and Q. Chen, "EWMA techniques for detecting computer intrusions through anomalous changes in event intensity," IEEE Trans. Rel., vol. 52, no. 1, Mar. 2004.
-
(2004)
IEEE Trans. Rel.
, vol.52
, Issue.1
-
-
Ye, N.1
Chen, Q.2
|