-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P Anderson Co., Fort Washington, Pennsylvania, April
-
J. Anderson. Computer security threat monitoring and surveillance. Technical report, James P Anderson Co., Fort Washington, Pennsylvania, April 1980.
-
(1980)
Technical Report
-
-
Anderson, J.1
-
3
-
-
2942749266
-
BlueBox: A policy-driven, host-Based intrusion detection system
-
May
-
S. Chad and P. Cheng. BlueBox: A Policy-Driven, Host-based Intrusion Detection System. ACM Transaction on Infomation and System Security, 6(2): 173-200, May 2003.
-
(2003)
ACM Transaction on Infomation and System Security
, vol.6
, Issue.2
, pp. 173-200
-
-
Chad, S.1
Cheng, P.2
-
5
-
-
0034226287
-
A revised taxonomy for intrusion detection systems
-
H. Debar, M. Dacier, and A. Wespi. A revised taxonomy for intrusion detection systems. Annales des Telecommunications, 55(7-8):361-378, 2000.
-
(2000)
Annales des Telecommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
6
-
-
0029716418
-
A sense of self for unix processes
-
IEEE Computer Society Press
-
S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pages 120-128. IEEE Computer Society Press, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
7
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3): 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
8
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
K. Misch. Clustering intrusion detection alarms to support root cause analysis. ACM Transaction on Information and System Security, 6(4):443-471, 2003.
-
(2003)
ACM Transaction on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Misch, K.1
-
9
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
April
-
R. Kemmerer and G. Vigna. Intrusion detection: a brief history and overview. IEEE Computer, 35(4):supl27 - supl30, April 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.4
-
-
Kemmerer, R.1
Vigna, G.2
-
10
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Las Vegas, Nevada, December 08-12
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Bayesian event classification for intrusion detection. In 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 08-12 2003.
-
(2003)
19th Annual Computer Security Applications Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
11
-
-
84885774862
-
A framework for contructing features and models for intrusion detection systems
-
Nov.
-
W. Lee and S. Stolfo. A framework for contructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3(4):227-261, Nov. 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
12
-
-
0242456801
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
July 23-26
-
M. Mahoney and P. Chan. Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks. In SIGKDD 2002, July 23-26 2002.
-
(2002)
SIGKDD 2002
-
-
Mahoney, M.1
Chan, P.2
-
13
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
May
-
P. Ning, Y. Cui, and D. R. fand D. Xu. Techniques and tools for analyzing intrusion alerts. ACM Transactions on Information and System Security (TISSEC), 7(2):274-318, May. 2004.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Fand, D.R.3
Xu, D.4
-
15
-
-
0037252253
-
Determining the operational limits of an anomaly-based intrusion detector
-
Jan.
-
K. Tan and R. Maxion. Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on selected areas in communications, 21(1):96-110, Jan. 2003.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 96-110
-
-
Tan, K.1
Maxion, R.2
|