-
1
-
-
0033293396
-
Toward a taxonomy of intrusion-detection systems
-
Debar H, Dacier M, Wespi A. Toward a taxonomy of intrusion-detection systems. Computer Networks, 1999, 31(8): 805-822.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
2
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
Ye N, Li XY, Chen Q, Emran SM, Xu MM. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001, 31(4): 266-274.
-
(2001)
IEEE Trans. on Systems, Man, and Cybernetics - Part A: Systems and Humans
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.Y.2
Chen, Q.3
Emran, S.M.4
Xu, M.M.5
-
3
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
Orlando: IEEE Computer Society Press
-
Ko C, Fink G, Levitt K. Automated detection of vulnerabilities in privileged programs by execution monitoring. In: Proc. of the 10th Annual Computer Security Applications Conf Orlando: IEEE Computer Society Press, 1994. 134-144.
-
(1994)
Proc. of the 10th Annual Computer Security Applications Conf.
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
4
-
-
84867854789
-
A security-enhanced operating system
-
Bernaschi M, Gabrielli E, Mancini LV. REMUS: A security-enhanced operating system. ACM Trans. on Information and System Security, 2002, 5(1): 36-61.
-
(2002)
REMUS: ACM Trans. on Information and System Security
, vol.5
, Issue.1
, pp. 36-61
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.V.3
-
6
-
-
85090433665
-
Snort-Lightweight intrusion detection for networks
-
Washington: USENIX
-
Marty R. Snort-Lightweight intrusion detection for networks In: Proc. of the 13th Conf. on Systems Administration. Washington: USENIX, 1999. 229-238.
-
(1999)
Proc. of the 13th Conf. on Systems Administration
, pp. 229-238
-
-
Marty, R.1
-
8
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr SA, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3): 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
9
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Anaheim: IEEE Computer Society Press
-
Lee W, Stolfo SJ, Chan PK, Eskin E, Fan W, Miller M, Hershkop S, Zhang J. Real time data mining-based intrusion detection. In: Proc. of the 2nd DARPA Information Survivability Conf and Exposition II. Anaheim: IEEE Computer Society Press, 2001. 89 -100.
-
(2001)
Proc. of the 2nd DARPA Information Survivability Conf. and Exposition II
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
10
-
-
0035402096
-
Training a neural-network based intrusion detector to recognize novel attacks
-
Lee SC, Heinbuch DV. Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans. on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001, 31(4): 294-299.
-
(2001)
IEEE Trans. on Systems, Man, and Cybernetics - Part A: Systems and Humans
, vol.31
, Issue.4
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
11
-
-
0029716418
-
A sense of self for UNIX processes
-
Oakland, CA: IEEE Computer Society Press
-
Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for UNIX processes. In Proc. of the 1996 IEEE Symp. on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 120-128.
-
(1996)
Proc. of the 1996 IEEE Symp. on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
12
-
-
0002774999
-
Learning patterns from UNIX process execution traces for intrusion detection
-
Providence, Rhode Island: AAAI Press
-
Lee W, Stolfo SJ. Learning patterns from UNIX process execution traces for intrusion detection. In Proc. of the AAAI97 Workshop on AI Methods in Fraud and Risk Management. Providence, Rhode Island: AAAI Press, 1997. 50-56.
-
(1997)
Proc. of the AAAI97 Workshop on AI Methods in Fraud and Risk Management
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.J.2
-
15
-
-
84947547225
-
Experiences with specification-based intrusion detection
-
Lee W., Me L. and Wespi A. (ed.), Davis: Springer-Verlag
-
Uppuluri P, Sekar R. Experiences with specification-based intrusion detection. In: Lee W, Me L, Wespi A, eds. Proc. of the 4th Int'l Symp. on Recent Advances in Intrusion Detection. Davis: Springer-Verlag, 2001. 172-189.
-
(2001)
Proc. of the 4th Int'l Symp. on Recent Advances in Intrusion Detection
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
16
-
-
2942749266
-
BlueBox: A policy-driven, host-based intrusion detection system.
-
Chari SN, Cheng PC. BlueBox: A policy-driven, host-based intrusion detection system. ACM Trans. on Information and System Security, 2003, 6(2): 173-200.
-
(2003)
ACM Trans. on Information and System Security
, vol.6
, Issue.2
, pp. 173-200
-
-
Chari, S.N.1
Cheng, P.C.2
-
17
-
-
2942741960
-
The LINUX intrusion detection project
-
Xie HG, Biondi P. The LINUX intrusion detection project. 2002. http://www.lids.org
-
(2002)
-
-
Xie, H.G.1
Biondi, P.2
-
18
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
San Jose USENIX
-
Walker KM, Sterne DF, Badger ML, Petkac MJ, Shermann DL, Oostendorp KA. Confining root programs with domain and type enforcement. In: Proc. of the 6th USENIX Security Symp., Focusing on Applications of Cryptography. San Jose USENIX, 1996. 21-36.
-
(1996)
Proc. of the 6th USENIX Security Symp., Focusing on Applications of Cryptography
, pp. 21-36
-
-
Walker, K.M.1
Sterne, D.F.2
Badger, M.L.3
Petkac, M.J.4
Shermann, D.L.5
Oostendorp, K.A.6
|