-
1
-
-
0000010513
-
Network based intrusion detection: A review of technologies
-
K. Richards, Network based intrusion detection: a review of technologies, Computers & Security 18 (1999), 671-682.
-
(1999)
Computers & Security
, vol.18
, pp. 671-682
-
-
Richards, K.1
-
2
-
-
0037024115
-
Evaluation of the performance of IDS systems in a switched and distributed environment
-
C. Iheagwara et al., Evaluation of the performance of IDS systems in a switched and distributed environment, Computer Networks 39 (2002), 93-112.
-
(2002)
Computer Networks
, vol.39
, pp. 93-112
-
-
Iheagwara, C.1
-
3
-
-
0037244227
-
A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
-
C. Iheagwara et al., A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment, Journal of Computer Security 11(1) (2003).
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
-
-
Iheagwara, C.1
-
5
-
-
27844454587
-
Cost-based modeling for fraud and intrusion detection results from the JAM project
-
Columbia University
-
S. Stolfo et al., Cost-Based Modeling for Fraud and Intrusion Detection Results from the JAM Project, Technical Report, Columbia University.
-
Technical Report
-
-
Stolfo, S.1
-
9
-
-
27844535509
-
A preliminary classification scheme for information system threats, attacks, and defenses; a cause and effect model; and some analysis based on that model
-
September
-
Cohen et al., A preliminary classification scheme for information system threats, attacks, and defenses; a cause and effect model; and some analysis based on that model, Sandia National Laboratories, September, 1998.
-
(1998)
Sandia National Laboratories
-
-
Cohen1
-
10
-
-
85039380291
-
Federal information processing standards
-
National Institute of Standards and Technology, FIPS PUB 191, November
-
Federal Information Processing Standards, Guideline for the Analysis of Local Area Network Security. National Institute of Standards and Technology, FIPS PUB 191, November 1994; http://www.itl.nist.gov/fipspubs/fip191.htm.
-
(1994)
Guideline for the Analysis of Local Area Network Security
-
-
-
11
-
-
2142850601
-
Computer matching by government agencies: The failure of cost/benefit analysis as a control mechanism
-
R. Clarke, Computer matching by government agencies: The failure of cost/benefit analysis as a control mechanism, Information Infrastructure and Policy 4, 1 (March) (1995); http://www.anu.edu.au/people/Roger.Clarke/DV/ MatchCBA.html.
-
(1995)
Information Infrastructure and Policy
, vol.4
, Issue.1 MARCH
-
-
Clarke, R.1
-
14
-
-
0003320305
-
A cost-based security analysis of symmetric and asymmetric key lengths
-
R.D. Silverman, A cost-based security analysis of symmetric and asymmetric key lengths, RSA Laboratories Bulletin 13 (April) (2000).
-
(2000)
RSA Laboratories Bulletin
, vol.13
, Issue.APRIL
-
-
Silverman, R.D.1
-
15
-
-
4944234006
-
Return on information security investments: Myths vs. realities
-
L. Gordon et al., Return on information security investments: Myths vs. realities. Strategic Finance Magazine (Nov.) (2002); http://www. strategicfinancemag.com/2002/11i.htm.
-
(2002)
Strategic Finance Magazine
, Issue.NOV.
-
-
Gordon, L.1
-
16
-
-
2342493220
-
-
Netsolve, Inc., Austin, USA
-
T. Kevin et al., CTM, Technical Report, Netsolve, Inc., Austin, USA, 2002.
-
(2002)
CTM, Technical Report
-
-
Kevin, T.1
-
17
-
-
27844529722
-
The effect of intrusion detection management methods on the return on investment
-
accepted
-
C. Iheagwara, The effect of intrusion detection management methods on the return on investment, Computers & Security Journal (October) (2003) (accepted).
-
(2003)
Computers & Security Journal
, Issue.OCTOBER
-
-
Iheagwara, C.1
-
18
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
H. Debar et al., Towards a taxonomy of intrusion-detection systems. Computer Networks 31 (1999).
-
(1999)
Computer Networks
, vol.31
-
-
Debar, H.1
-
19
-
-
85039380825
-
-
http://www.silicondefense.com/software/acbm/speed_of_snort_03_16_2001. pdf.
-
-
-
-
20
-
-
85039363477
-
-
http://www.nss.co.uk/Articles/IntrusionDetection.htm.
-
-
-
|