-
1
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Carnegie Mellon Software Engineering Institute
-
Allen, J, Christie, A, Fithen, W, McHugh, J, Pickel, J and Stoner, E, 2000, "State of the practice of intrusion detection technologies" Technical Report 99TR028, Carnegie Mellon Software Engineering Institute.
-
(2000)
Technical Report
, vol.99 TR028
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
3
-
-
0004048154
-
Computer security, threat monitoring, and surveillance
-
James P. AndersonCo
-
Anderson, JP, 1980, "Computer security, threat monitoring, and surveillance" Technical report, James P. AndersonCo.
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
5
-
-
22644451496
-
Principal direction divisive partitioning
-
Boley, D, 1998, "Principal direction divisive partitioning" Data Mining and Knowledge Discovery 4(2) 325-344.
-
(1998)
Data Mining and Knowledge Discovery
, vol.4
, Issue.2
, pp. 325-344
-
-
Boley, D.1
-
9
-
-
0345028807
-
Event recognition beyond signature and anomaly
-
Doyle, J, Kohane, I, Long, W, Shrobe, H and Szolovits, P, 2001, "Event recognition beyond signature and anomaly" 2nd IEEE-SMC Information Assurance Workshop.
-
(2001)
2nd IEEE-SMC Information Assurance Workshop
-
-
Doyle, J.1
Kohane, I.2
Long, W.3
Shrobe, H.4
Szolovits, P.5
-
10
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
Eckmann, S, Vigna, G and Kemmerer, R, 2002, "STATL: an attack language for state-based intrusion detection" Journal of Computer Security 10(1/2) 71-104.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
11
-
-
0242602337
-
-
Fikes, R and McGuinness, DL, 2001, "An axiomatic semantics for RDF, RDF-S, and DAML+OIL" available at http://www.w3.org/TR/daml+oil-axioms.
-
(2001)
An Axiomatic Semantics for RDF, RDF-S, and DAML+OIL
-
-
Fikes, R.1
McGuinness, D.L.2
-
15
-
-
0029341392
-
Contemporary application-domain taxonomies
-
Glass, RL and Vessey, I, 1995, "Contemporary application-domain taxonomies" IEEE Software 63-76.
-
(1995)
IEEE Software
, pp. 63-76
-
-
Glass, R.L.1
Vessey, I.2
-
18
-
-
35148839490
-
A translation approach to portable ontologies
-
Gruber, TF, 1993, "A translation approach to portable ontologies" Knowledge Acquisition 5(2) 199-220.
-
(1993)
Knowledge Acquisition
, vol.5
, Issue.2
, pp. 199-220
-
-
Gruber, T.F.1
-
19
-
-
0031190959
-
Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
-
Guha, B and Mukherjee, B, 1997, "Network security via reverse engineering of TCP code: vulnerability analysis and proposed solutions" IEEE Networks 40-48.
-
(1997)
IEEE Networks
, pp. 40-48
-
-
Guha, B.1
Mukherjee, B.2
-
21
-
-
84964526751
-
Extending the DARPA off-line intrusion detection evaluations
-
Haines, JW, Rossey, LM, Lippman, RP and Cunningham, RK, 2001, "Extending the DARPA off-line intrusion detection evaluations" DARPA Information Survivability Conference and Exposition II 1 77-88.
-
(2001)
DARPA Information Survivability Conference and Exposition II
, vol.1
, pp. 77-88
-
-
Haines, J.W.1
Rossey, L.M.2
Lippman, R.P.3
Cunningham, R.K.4
-
22
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S, Forrest, S and Somayaji, A, 1998, "Intrusion detection using sequences of system calls" Journal of Computer Security 6 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
27
-
-
2942524707
-
-
Kopena, J, 2002, "DAMLJessKB" available at http://edge.mcs. drexel.edu/assemblies/software/damljesskb/articles/DAMLJessKB-2002.pdf.
-
(2002)
DAMLJessKB
-
-
Kopena, J.1
-
28
-
-
0035416012
-
Low-complexity fuzzy relational clustering algorithms for web mining
-
Krishnapuram, R, Joshi, A, Nasraoui, O and Yi, L, 2001, "Low-complexity fuzzy relational clustering algorithms for Web mining" IEEE transactions on Fuzzy Systems 9.
-
(2001)
IEEE Transactions on Fuzzy Systems
, vol.9
-
-
Krishnapuram, R.1
Joshi, A.2
Nasraoui, O.3
Yi, L.4
-
30
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Landwehr, CE, Bull, AR, McDermott, JP and Choi, WS, 1994, "A taxonomy of computer program security flaws" ACM Computing Surveys 26(3) 211-254.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
34
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Lippmann, R, Fried, D, Graf, I, Haines, J, Kendall, K, McClung, D, Weber, D, Webster, S, Wyschogrod, D, Cunningham, R and Zissman, M, 2000, "Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation" Proceedings of the DARPA Information Survivability Conference and Exposition, 2000 12-26.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition, 2000
, pp. 12-26
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
35
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
-
VOL(iss) NN-NN
-
McHugh, J, 2000, "Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory" ACM Transactions on Information and System Security VOL(iss) NN-NN.
-
(2000)
ACM Transactions on Information and System Security
-
-
McHugh, J.1
-
36
-
-
84883386223
-
Abstraction-based intrusion in distributed environments
-
Ning, P, Jajodia, S and Wang, XS, 2001, "Abstraction-based intrusion in distributed environments" ACM Transactions on Information and Systems Security 4(4) 407-452.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.4
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
37
-
-
0242456149
-
Ontology in information security: A useful theoretical foundation and methodological tool
-
Raskin, V, Hempelmann, CF, Triezenberg, KE and Nirenburg, S, 2001, "Ontology in information security: a useful theoretical foundation and methodological tool" Proceedings of NSPW-2001 53-59.
-
(2001)
Proceedings of NSPW-2001
, pp. 53-59
-
-
Raskin, V.1
Hempelmann, C.F.2
Triezenberg, K.E.3
Nirenburg, S.4
-
41
-
-
0037376432
-
A secure infrastructure for service discovery and access in pervasive computing
-
Undercoffer, J, Perich, P, Cedilnik, A, Kagal, L and Joshi, A, 2003, "A secure infrastructure for service discovery and access in pervasive computing" Mobile Networks and Applications: Special Issue on Security 8(2) 113-126.
-
(2003)
Mobile Networks and Applications: Special Issue on Security
, vol.8
, Issue.2
, pp. 113-126
-
-
Undercoffer, J.1
Perich, P.2
Cedilnik, A.3
Kagal, L.4
Joshi, A.5
-
42
-
-
25344467026
-
An empirical analysis of computer attacks and intrusions
-
University of Maryland, Baltimore County
-
Undercoffer, J and Pinkston, J, 2002, "An empirical analysis of computer attacks and intrusions" Technical Report TR-CS-03-11, University of Maryland, Baltimore County.
-
(2002)
Technical Report
, vol.TR-CS-03-11
-
-
Undercoffer, J.1
Pinkston, J.2
|