-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P. Anderson Co., Fort Washington, Pennsylvania, April
-
James P. Anderson, "Computer Security Threat Monitoring and Surveillance", Technical report, James P. Anderson Co., Fort Washington, Pennsylvania, April 1980.
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
2
-
-
0031209960
-
The threat from the net
-
August
-
Matt Bishop, Steven Cheung, and Chris Wee, "The Threat from the Net", 34(8) IEEE Spectrum, pages 56-63, August 1997.
-
(1997)
IEEE Spectrum
, vol.34
, Issue.8
, pp. 56-63
-
-
Bishop, M.1
Cheung, S.2
Wee, C.3
-
3
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
April
-
Herve Debar, Marc Dacier and Andreas Wespi, "Towards a Taxonomy of Intrusion-Detection Systems", Computer Networks, 31(8), pages 805-822, April 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
4
-
-
0023294428
-
An intrusion-detection model
-
Feb.
-
Dorothy Denning, "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, SE-13(2). pages 222-232, Feb. 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
5
-
-
35048870265
-
Redundancy and diversity in security
-
Sophia Antipolis, France, September 2004, Lecture Notes In Computer Science # 3193, Springer-Verlag, Berlin
-
Bev Littlewood and Lorenzo Strigini, "Redundancy and Diversity in Security", In Proceedings ESORICS 2004, 9th European Symposium on Research in Computer Security, pages 423-438, Sophia Antipolis, France, September 2004, Lecture Notes In Computer Science # 3193, Springer-Verlag, Berlin, 2004.
-
(2004)
Proceedings ESORICS 2004, 9th European Symposium on Research in Computer Security
, pp. 423-438
-
-
Littlewood, B.1
Strigini, L.2
-
6
-
-
0026850007
-
A neural network component for an intrusion detection system
-
04-06 May, Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA
-
Herve Debar, Monique Becker, and Didier Siboni, "A Neural Network Component for an Intrusion Detection System", In Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pages 240-250, 04-06 May 1992, Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA.
-
(1992)
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
7
-
-
0029716418
-
A sense of self for unix processes
-
06-08 May, Oakland, CA. IEEE Computer Security Press, Los Alamitos, CA
-
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff, "A Sense of Self for Unix Processes", In Proc. 1996 IEEE Symp. on Security and Privacy, pp. 120-128, 06-08 May 1996, Oakland, CA. IEEE Computer Security Press, Los Alamitos, CA.
-
(1996)
Proc. 1996 IEEE Symp. on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
8
-
-
0012292276
-
A neural network approach towards intrusion detection
-
01-04 October, Washington DC
-
Kevin L. Fox, Ronda R. Henning, Jonathan H. Reed, and Richard Simonian, "A Neural Network Approach Towards Intrusion Detection", In Proceedings of the 13th National Computer Security Conference, pages 125-134, 01-04 October 1990, Washington DC.
-
(1990)
Proceedings of the 13th National Computer Security Conference
, pp. 125-134
-
-
Fox, K.L.1
Henning, R.R.2
Reed, J.H.3
Simonian, R.4
-
9
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
09-12 April, Santa Clara, CA. USENIX Association, Berkeley, CA
-
Anup Gosh, Aaron Schwartzbard and Michael Schatz "Learning Program Behavior Profiles for Intrusion Detection", In Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pages 51-62, 09-12 April 1999, Santa Clara, CA. USENIX Association, Berkeley, CA.
-
(1999)
Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 51-62
-
-
Gosh, A.1
Schwartzbard, A.2
Schatz, M.3
-
10
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
Scottsdale, AZ, 07-11 December . IEEE Computer Security Press, Los Alamitos, CA
-
Anup Gosh, James Wanken, and Frank Charron "Detecting Anomalous and Unknown Intrusions Against Programs", In Proceedings of the 14th Annual Computer Security Applications Conference, pages 259-267, Scottsdale, AZ, 07-11 December 1998. IEEE Computer Security Press, Los Alamitos, CA.
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 259-267
-
-
Gosh, A.1
Wanken, J.2
Charron, F.3
-
11
-
-
0003518833
-
-
Ph.D. Dissertation, Purdue University, West Lafayette, Indiana, August
-
Sandeep Kumar, "Classification and Detection of Computer Intrusions", Ph.D. Dissertation, Purdue University, West Lafayette, Indiana, August 1995.
-
(1995)
Classification and Detection of Computer Intrusions
-
-
Kumar, S.1
-
12
-
-
0034829265
-
Markov chains, classifiers, and intrusion detection
-
11-13 June, Cape Breton, Nova Scotia, Canada
-
Somesh Jha, Kymie M. C. Tan, and Roy A. Maxion, "Markov Chains, Classifiers, and Intrusion Detection", In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 206-219, 11-13 June 2001, Cape Breton, Nova Scotia, Canada.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 206-219
-
-
Jha, S.1
Tan, K.M.C.2
Maxion, R.A.3
-
13
-
-
0001858279
-
Sequence matching and learning in anomaly detection for computer security
-
AAAI Press, 27-31 July, Providence, RI
-
Terran Lane and Carla E. Brodley, "Sequence Matching and Learning in Anomaly Detection for Computer Security", In Proc. of AAAI-97 Workshop: AI Approaches to Fraud Detection and Risk Management, AAAI Press, pp. 43-49, 27-31 July 1997, Providence, RI.
-
(1997)
Proc. of AAAI-97 Workshop: AI Approaches to Fraud Detection and Risk Management
, pp. 43-49
-
-
Lane, T.1
Brodley, C.E.2
-
14
-
-
0034590432
-
Benchmarking anomaly-based detection systems
-
25-28 June, New York, NY. IEEE Computer Society Press
-
Roy A. Maxion and Kymie M. C. Tan, "Benchmarking Anomaly-Based Detection Systems", In Proceedings of the International Conference on Dependable Systems and Networks, pages 623-630, 25-28 June 2000, New York, NY. IEEE Computer Society Press.
-
(2000)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 623-630
-
-
Maxion, R.A.1
Tan, K.M.C.2
-
15
-
-
0036472459
-
Anomaly detection in embedded systems
-
February
-
Roy A. Maxion and Kymie M. C. Tan, "Anomaly Detection in Embedded Systems", IEEE Transactions on Computers, 51(2), pages 108-120, February 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.2
, pp. 108-120
-
-
Maxion, R.A.1
Tan, K.M.C.2
-
16
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Andreas Wespi, Giovanni Vigna and Luca Deri (Eds.), 16-18 October 2002, Zurich, Switzerland, Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin
-
Kymie M. C. Tan; Kevin S. Killourhy, and Roy A. Maxion, "Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits", In Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002), Andreas Wespi, Giovanni Vigna and Luca Deri (Eds.), 16-18 October 2002, Zurich, Switzerland, pp. 54-73. Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin, 2002.
-
(2002)
Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002)
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
17
-
-
0036085540
-
'Why 6?' Defining the operational limits of slide, an anomaly-based intrusion detector
-
12-15 May, Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA
-
Kymie M. C. Tan and Roy A. Maxion, " 'Why 6?' Defining the Operational Limits of slide, an Anomaly-Based Intrusion Detector", In Proceedings 2002 IEEE Symposium on Security and Privacy, pages 188-201, 12-15 May 2002, Oakland, CA. IEEE Computer Society Press, Los Alamitos, CA.
-
(2002)
Proceedings 2002 IEEE Symposium on Security and Privacy
, pp. 188-201
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
18
-
-
0025548907
-
Security audit trail analysis using inductively generated predictive rules
-
IEEE Service Center, Piscataway, NJ, March
-
Henry S. Teng, Kaihu Chen, and Stephen C-Y Lu, "Security Audit Trail Analysis Using Inductively Generated Predictive Rules", In Proc. of the Sixth Conference on Artificial Intelligence Applications, pages 24-29, IEEE Service Center, Piscataway, NJ, March 1990.
-
(1990)
Proc. of the Sixth Conference on Artificial Intelligence Applications
, pp. 24-29
-
-
Teng, H.S.1
Chen, K.2
Lu, S.C.-Y.3
-
19
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
18-22 Nov., Washington, DC. ACM Press, New York, NY, USA
-
David Wagner and Paolo Soto. "Mimicry attacks on host-based intrusion detection systems", In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 55-264, 18-22 Nov. 2002, Washington, DC. ACM Press, New York, NY, USA.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 55-264
-
-
Wagner, D.1
Soto, P.2
-
20
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
09-12 May Oakland, CA. IEEE Computer Security Press, Los Alamitos, CA
-
Christina Warrender, Stephanie Forrest and Barak Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models", In Proceedings 1999 IEEE Symposium on Security and Privacy, pages 133-145, 09-12 May 1999, Oakland, CA. IEEE Computer Security Press, Los Alamitos, CA.
-
(1999)
Proceedings 1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|