-
1
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, Testing and evaluating computer intrusion detection systems, Commun. ACM 42 (7), 53-61 (1999).
-
(1999)
Commun. ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
2
-
-
85019691440
-
Testing intrusion detection systems
-
J. McHugh, Testing intrusion detection systems, ACM Trans. Inform. Syst. Secur. 3 (4), 262-294 (2000).
-
(2000)
ACM Trans. Inform. Syst. Secur.
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
3
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
IEEE Computer Society, Los Alamitos, CA
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman, Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation, Proceedings of DISCEX 2000, IEEE Computer Society, Los Alamitos, CA (1999).
-
(1999)
Proceedings of DISCEX 2000
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
4
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
-
IEEE Computer Society, Los Alamitos, CA
-
S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. Chan, Cost-based modeling for fraud and intrusion detection: Results from the JAM project, Proceedings of DISCEX 2000, IEEE Computer Society, Los Alamitos, CA (1999).
-
(1999)
Proceedings of DISCEX 2000
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.5
-
5
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
J. McHugh, A. Christie, and J. Allen, Defending yourself: the role of intrusion detection systems, IEEE Software 17 (5), 42-51 (2000).
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
6
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Trans. Inform. Syst. Secur. 3 (3), 186-205 (2000).
-
(2000)
ACM Trans. Inform. Syst. Secur.
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
8
-
-
2942680824
-
Results of DARPA 1998 off-line intrusion detection evaluation
-
Cambridge, MA, 15 December
-
I. Graf, R. Lippmann, R. Cunningham, D. Fried, K. Kendall, S. Webster, and M. Zissman, Results of DARPA 1998 off-line intrusion detection evaluation, Presented at DARPA PI Meeting, Cambridge, MA, 15 December 1998.
-
(1998)
DARPA PI Meeting
-
-
Graf, I.1
Lippmann, R.2
Cunningham, R.3
Fried, D.4
Kendall, K.5
Webster, S.6
Zissman, M.7
-
9
-
-
85095970245
-
Experience with EMERALD to date
-
Santa Clara, CA, 11-12 April
-
P. Neumann and P. Porras, Experience with EMERALD to date, 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, 11-12 April 1999, pp. 73-80.
-
(1999)
1st USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 73-80
-
-
Neumann, P.1
Porras, P.2
-
10
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Trans. Inform. Syst. Secur. 3 (4), 227-261 (2000).
-
(2000)
ACM Trans. Inform. Syst. Secur.
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
11
-
-
0034827684
-
Evaluation of intrusion detectors: A decision theory approach
-
IEEE Computer Society, Los Alamitos, CA
-
J. Gaffney, and J. Ulvila, Evaluation of intrusion detectors: A decision theory approach, Proceedings of the 2001 IEEE Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos, CA (2001) pp. 50-61.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 50-61
-
-
Gaffney, J.1
Ulvila, J.2
-
13
-
-
0004060388
-
-
MIT Press, Cambridge, MA
-
J. Pratt, H. Raiffa, and R. Schlaifer, Introduction to statistical decision theory, MIT Press, Cambridge, MA (1995).
-
(1995)
Introduction to Statistical Decision Theory
-
-
Pratt, J.1
Raiffa, H.2
Schlaifer, R.3
-
14
-
-
0034588633
-
On the trail of intrusions into information systems
-
S. Kent, On the trail of intrusions into information systems, IEEE Spectrum 37 (12), 52-56 (2000).
-
(2000)
IEEE Spectrum
, vol.37
, Issue.12
, pp. 52-56
-
-
Kent, S.1
-
15
-
-
0035283313
-
Robust classification for imprecise environments
-
F. Provost and T. Fawcett, Robust classification for imprecise environments, Machine Learning J. 42 (3), 203-231 (2001).
-
(2001)
Machine Learning J.
, vol.42
, Issue.3
, pp. 203-231
-
-
Provost, F.1
Fawcett, T.2
-
16
-
-
0034836394
-
Intrusion detection via static analysis
-
IEEE Computer Society, Los Alamitos, CA
-
D. Wagner and D. Dean, Intrusion detection via static analysis, Proceedings of the 2001 IEEE Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos, CA (2001) pp. 156-168.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 156-168
-
-
Wagner, D.1
Dean, D.2
-
17
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
IEEE Computer Society, Los Alamitos, CA
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, Buffer overflows: Attacks and defenses for the vulnerability of the decade, Proceedings of DISCEX 2000, IEEE Computer Society, Los Alamitos, CA (1999) pp. 154-163.
-
(1999)
Proceedings of DISCEX 2000
, pp. 154-163
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
|