메뉴 건너뛰기




Volumn 18, Issue 3, 2003, Pages 221-241

Using DAML + OIL to classify intrusive behaviours

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER PROGRAMMING LANGUAGES; INFERENCE ENGINES; INTERNET; KNOWLEDGE BASED SYSTEMS; MATHEMATICAL MODELS;

EID: 2942530528     PISSN: 02698889     EISSN: None     Source Type: Journal    
DOI: 10.1017/S0269888904000049     Document Type: Article
Times cited : (13)

References (46)
  • 1
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • Carnegie Mellon Software Engineering Institute
    • Allen, J, Christie, A, Fithen, W, McHugh, J, Pickel, J and Stoner, E, 2000, "State of the practice of intrusion detection technologies" Technical Report 99TR028, Carnegie Mellon Software Engineering Institute.
    • (2000) Technical Report , vol.99 TR028
    • Allen, J.1    Christie, A.2    Fithen, W.3    McHugh, J.4    Pickel, J.5    Stoner, E.6
  • 3
    • 0004048154 scopus 로고
    • Computer security, threat monitoring, and surveillance
    • James P. AndersonCo
    • Anderson, JP, 1980, "Computer security, threat monitoring, and surveillance" Technical report, James P. AndersonCo.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 5
    • 22644451496 scopus 로고    scopus 로고
    • Principal direction divisive partitioning
    • Boley, D, 1998, "Principal direction divisive partitioning" Data Mining and Knowledge Discovery 4(2) 325-344.
    • (1998) Data Mining and Knowledge Discovery , vol.4 , Issue.2 , pp. 325-344
    • Boley, D.1
  • 10
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • Eckmann, S, Vigna, G and Kemmerer, R, 2002, "STATL: an attack language for state-based intrusion detection" Journal of Computer Security 10(1/2) 71-104.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 15
    • 0029341392 scopus 로고
    • Contemporary application-domain taxonomies
    • Glass, RL and Vessey, I, 1995, "Contemporary application-domain taxonomies" IEEE Software 63-76.
    • (1995) IEEE Software , pp. 63-76
    • Glass, R.L.1    Vessey, I.2
  • 18
    • 35148839490 scopus 로고
    • A translation approach to portable ontologies
    • Gruber, TF, 1993, "A translation approach to portable ontologies" Knowledge Acquisition 5(2) 199-220.
    • (1993) Knowledge Acquisition , vol.5 , Issue.2 , pp. 199-220
    • Gruber, T.F.1
  • 19
    • 0031190959 scopus 로고    scopus 로고
    • Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
    • Guha, B and Mukherjee, B, 1997, "Network security via reverse engineering of TCP code: vulnerability analysis and proposed solutions" IEEE Networks 40-48.
    • (1997) IEEE Networks , pp. 40-48
    • Guha, B.1    Mukherjee, B.2
  • 27
    • 2942524707 scopus 로고    scopus 로고
    • Kopena, J, 2002, "DAMLJessKB" available at http://edge.mcs. drexel.edu/assemblies/software/damljesskb/articles/DAMLJessKB-2002.pdf.
    • (2002) DAMLJessKB
    • Kopena, J.1
  • 35
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
    • VOL(iss) NN-NN
    • McHugh, J, 2000, "Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory" ACM Transactions on Information and System Security VOL(iss) NN-NN.
    • (2000) ACM Transactions on Information and System Security
    • McHugh, J.1
  • 42
    • 25344467026 scopus 로고    scopus 로고
    • An empirical analysis of computer attacks and intrusions
    • University of Maryland, Baltimore County
    • Undercoffer, J and Pinkston, J, 2002, "An empirical analysis of computer attacks and intrusions" Technical Report TR-CS-03-11, University of Maryland, Baltimore County.
    • (2002) Technical Report , vol.TR-CS-03-11
    • Undercoffer, J.1    Pinkston, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.