-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
Anderson Co. Fort Washington, PA
-
ANDERSON, J. P. "Computer security threat monitoring and surveillance". Tech. Rep. Anderson Co. Fort Washington, PA. 1980
-
(1980)
Tech. Rep.
-
-
Anderson, J.P.1
-
2
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
Jun.
-
D. Barbara, J. Couto, S. Jajodia, L. Popyack, and N. Wu. "ADAM: Detecting intrusions by data mining". In Proc. of the IEEE Workshop on Information Assurance and Security, Jun. 2001.
-
(2001)
Proc. of the IEEE Workshop on Information Assurance and Security
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
4
-
-
0038324607
-
-
SPADE, Silicon Defense, http://www.silicondefense.com/software/spice/
-
Silicon Defense
-
-
-
5
-
-
0004118981
-
The NIDES statistical component: Description and justification
-
SRI International, Computer Science Laboratory
-
JAVITS, H. S. AND VALDES, A. "The NIDES statistical component: Description and justification". Technical Rep. SRI International, Computer Science Laboratory. 1993
-
(1993)
Technical Rep.
-
-
Javits, H.S.1
Valdes, A.2
-
6
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
A. Ghosh and A. Schwartzbard, "A study in using neural networks for anomaly and misuse detection", USENIX Security Symposium, 1999
-
(1999)
USENIX Security Symposium
-
-
Ghosh, A.1
Schwartzbard, A.2
-
7
-
-
84948431640
-
Staterul intrusion detection for high-speed networks
-
CA, May
-
KRUEGEL, C., VALEUR, F., VIGNA, G., AND KEMMERER, R. A. Staterul intrusion detection for high-speed networks. In IEEE Symp. on Security and Privacy Berkeley, CA, May 2002.
-
(2002)
IEEE Symp. on Security and Privacy Berkeley
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.A.4
-
8
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington D.C., November
-
Peng Ning, Yun Cui, Douglas S. Reeves, "Constructing Attack Scenarios through Correlation of Intrusion Alerts," In Proceedings of the 9th ACM Conference on Computer & Communications Security, pages 245-254, Washington D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer & Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
13
-
-
27544516118
-
-
Nmap: http://www.insecure.org/nmap/
-
-
-
-
14
-
-
27544512336
-
-
Nessus: http://www.nessus.org/
-
-
-
-
15
-
-
27544513211
-
-
Ntop: http://www.ntop.org/
-
-
-
-
16
-
-
27544513658
-
-
Snort: http:/www.snort.org/
-
-
-
-
17
-
-
0004145058
-
-
Secure Networks Inc., January
-
Ptacek, T. H., Newsham, N. N., "Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection". Secure Networks Inc., January 1998.
-
(1998)
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, N.N.2
-
18
-
-
84883393843
-
-
DARPA dataset: http://www.ll.mit.edu/IST/ideval/data/data_index.html
-
DARPA Dataset
-
-
-
19
-
-
27544450046
-
-
MySQL: http://www.mysql.com/
-
-
-
-
20
-
-
27544502281
-
-
Snort DB: http://www.snort.org/docs/snortdb.png
-
-
-
-
21
-
-
27544493951
-
-
Tcpstat: http://www.frenchfries.net/paul/tcpstat/
-
-
-
-
22
-
-
24744463914
-
Results of the 1998 DARPA offline intrusion detection evaluation
-
R. Lippmann, R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, and M. A. Zissman. "Results of the 1998 DARPA Offline Intrusion Detection Evaluation", In Proc. Recent Advances in Intrusion Detection, 1999.
-
(1999)
Proc. Recent Advances in Intrusion Detection
-
-
Lippmann, R.1
Cunningham, R.K.2
Fried, D.J.3
Graf, I.4
Kendall, K.R.5
Webster, S.E.6
Zissman, M.A.7
-
23
-
-
27544449605
-
-
Tcpdump: http://www.tcpdump.org/
-
-
-
-
24
-
-
27544457896
-
-
Mucus: http://www.cs.ucsb.edu/~rsg/Mucus/
-
-
-
|