-
1
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
Berkeley, California. IEEE Computer Society
-
H. H. Feng, J. T. Giffin, Y. Huang, S. Jha, W. Lee, and B. P. Miller. Formalizing sensitivity in static analysis for intrusion detection. In Proceedings: IEEE Symposium on Security and Privacy, Berkeley, California, 2004. IEEE Computer Society.
-
(2004)
Proceedings: IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Giffin, J.T.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.P.6
-
2
-
-
70349100099
-
Anomaly detection using call stack information
-
Berkeley, California. IEEE Computer Society
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. In Proceedings: IEEE Symposium on Security and Privacy, Berkeley, California, 2003. IEEE Computer Society.
-
(2003)
Proceedings: IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
3
-
-
0029716418
-
A sense of self for unix processes
-
Los Alamitos, California
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In Proceedings: IEEE Symposium on Security and Privacy, pages 120-128, Los Alamitos, California, 1996.
-
(1996)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
8
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, Texas
-
W. Lee and S. J. Stolfo. Data mining approaches for intrusion detection. In Proceedings: USENIX Security Symposium, pages 79-94, San Antonio, Texas, 1998.
-
(1998)
Proceedings: USENIX Security Symposium
, pp. 79-94
-
-
Lee, W.1
Stolfo, S.J.2
-
10
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Oakland, California. IEEE Computer Society
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In Proceedings: IEEE Symposium on Security and Privacy, pages 144-155, Oakland, California, 2001. IEEE Computer Society.
-
(2001)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
11
-
-
84880858814
-
"Why 6?" defining the operational limits of stide, an anomaly-based intrusion detector
-
Berkeley, California. IEEE Computer Society
-
K. M. Tan and R. A. Maxion, "why 6?" defining the operational limits of stide, an anomaly-based intrusion detector. In Proceedings: IEEE Symposium on Security and Privacy, pages 173-186, Berkeley, California, 2002. IEEE Computer Society.
-
(2002)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 173-186
-
-
Tan, K.M.1
Maxion, R.A.2
-
12
-
-
0034836394
-
Intrusion detection via static analysis
-
Oakland, California. IEEE Computer Society
-
D. Wagner and D. Dean. Intrusion detection via static analysis. In Proceedings: IEEE Symposium on Security and Privacy, pages 156-169, Oakland, California, 2001. IEEE Computer Society.
-
(2001)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 156-169
-
-
Wagner, D.1
Dean, D.2
-
13
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Los Alamitos, California
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: alternative data models. In Proceedings: IEEE Symposium on Security and Privacy, pages 133-145, Los Alamitos, California, 1999.
-
(1999)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|