-
2
-
-
2542563730
-
An experimentation workbench for intrusion detection systems
-
IBM Research Division, Zurich Research Laboratory, Zurich, Switzerland
-
H. Debar, M. Dacier, A. Wespi, and S. Lampart. An experimentation workbench for intrusion detection systems. Technical Report RZ2998, IBM Research Division, Zurich Research Laboratory, Zurich, Switzerland, 1998.
-
(1998)
Technical Report
, vol.RZ2998
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
4
-
-
0029716418
-
A sense of self for unix processes
-
IEEE Computer Society Press
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A Sense of Self for Unix Processes. In Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy, pages 120-128. IEEE Computer Society Press, 1996.
-
(1996)
Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
5
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Santa Clara, California, April
-
A. Ghosh, A. Schwartzbard, and M. Schatz. Learning program behavior profiles for intrusion detection. In 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999.
-
(1999)
1st USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Ghosh, A.1
Schwartzbard, A.2
Schatz, M.3
-
6
-
-
0013420742
-
Using unix: Collected traces of 168 users
-
Department of Computer Science, University of Calgary, Calgary, Canada
-
S. Greenberg. Using Unix: Collected Traces of 168 Users. Technical Report 88/333/45, Department of Computer Science, University of Calgary, Calgary, Canada, 1988.
-
(1988)
Technical Report 88/333/45
-
-
Greenberg, S.1
-
8
-
-
21644470792
-
-
T. Lane. Purdue UNIX User Data. http://www.cs.unm.edu/terran/research/data/Purdue_UNIX_user_data.tar.gz, 1999.
-
(1999)
Purdue UNIX User Data
-
-
Lane, T.1
-
9
-
-
0003027845
-
An application of machine learning to anomaly detection
-
Gaithersburg, MD, The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology
-
T. Lane and C. E. Brodley. An application of machine learning to anomaly detection. In Proceedings of the Twentieth National Information Systems Security Conference, volume 1, pages 366-380, Gaithersburg, MD, 1997. The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology.
-
(1997)
Proceedings of the Twentieth National Information Systems Security Conference
, vol.1
, pp. 366-380
-
-
Lane, T.1
Brodley, C.E.2
-
11
-
-
21644484977
-
An empirical study of two approaches to sequence learning for anomaly detection
-
Under review
-
T. Lane and C. E. Brodley. An empirical study of two approaches to sequence learning for anomaly detection. Machine Learning, 1999. Under review.
-
(1999)
Machine Learning
-
-
Lane, T.1
Brodley, C.E.2
-
13
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
October
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. The 1999 DARPA Off-line Intrusion Detection Evaluation. Computer Networks: The International Journal of Computer and Telecommunications Networking (Special issue on recent advances in intrusion detection systems), 34(4):579 - 595, October 2000.
-
(2000)
Computer Networks: The International Journal of Computer and Telecommunications Networking (Special Issue on Recent Advances in Intrusion Detection Systems)
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
14
-
-
1642416386
-
The 1998 DARPA/AFRL off-line intrusion detection evaluation
-
Louvain-la-Neuve, Belgium
-
R. P. Lippmann, I. Graf, D. Wyschogrod, S. E. Webster, D. J. Weber, and S. Gorton. The 1998 DARPA/AFRL Off-Line Intrusion Detection Evaluation. In First International Workshop on Recent Advances in Intrusion Detection (RAID), Louvain-la-Neuve, Belgium, 1998.
-
(1998)
First International Workshop on Recent Advances in Intrusion Detection (RAID)
-
-
Lippmann, R.P.1
Graf, I.2
Wyschogrod, D.3
Webster, S.E.4
Weber, D.J.5
Gorton, S.6
-
17
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
November
-
J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions of Information and System Security (TISSEC), 3(4), November 2000.
-
(2000)
ACM Transactions of Information and System Security (TISSEC)
, vol.3
, Issue.4
-
-
McHugh, J.1
-
18
-
-
21644472211
-
-
ns2
-
ns2. The Network Simulator. http://www.isi.edu/nsnam/ns/ns-documentation.html.
-
The Network Simulator
-
-
-
22
-
-
84879333627
-
Lariat: Lincoln adaptable real-time information assurance testbed
-
March
-
L. M. Rossey, R. K. Cunningham, D. J. Fried, J. C. Rebek, R. P. Lippmann, J. W. Haines, and M. A. Zissman. Lariat: Lincoln adaptable real-time information assurance testbed,. In 2002 IEEE Aerospace Conference, March 2002.
-
(2002)
2002 IEEE Aerospace Conference
-
-
Rossey, L.M.1
Cunningham, R.K.2
Fried, D.J.3
Rebek, J.C.4
Lippmann, R.P.5
Haines, J.W.6
Zissman, M.A.7
-
24
-
-
0012282403
-
Computer intrusion:detecting masquerades
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, M. Theus, and Y. Vardi. Computer intrusion:detecting masquerades. Statistical Science, 16(1):58-74, 2000.
-
(2000)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
|