-
1
-
-
0004048154
-
"Computer Security Thread Monitoring and Surveillance"
-
Technical Report, James P. Andersong Company, Fort Washington, Pennsylvania, April
-
J.P.Anderson, "Computer Security Thread Monitoring and Surveillance", Technical Report, James P. Andersong Company, Fort Washington, Pennsylvania,April 1980.
-
(1980)
-
-
Anderson, J.P.1
-
2
-
-
0002473030
-
DIDS (Distributed Intrusion Detection System)-Motivation, Architecture and An Early Prototype
-
S.Snapp et al, DIDS (Distributed Intrusion Detection System)-Motivation, Architecture and An Early Prototype, In Proc. 1th National Computer Security Conference, 1991.
-
(1991)
Proc. 1th National Computer Security Conference
-
-
Snapp, S.1
-
4
-
-
25844456387
-
Intrusion Detection: A Brief History and Overview
-
Reliable Software Group, Computer Science Department, University of California Santa Barbara, Security& Privacy
-
A.Richard,Kemmerer,Giovanni Vigna, Intrusion Detection:A Brief History and Overview, Reliable Software Group,Computer Science Department,University of California Santa Barbara, SECURITY & PRIVACY-2002.
-
(2002)
-
-
Richard, A.1
Kemmerer2
Vigna, G.3
-
6
-
-
30144443546
-
"Results of the Distributed-Systems Intruder Tools Workshop"
-
CERT Coordination Center, Available
-
CERT Coordination Center, ""Results of the Distributed-Systems Intruder Tools Workshop", Available http://www.cert.org/reports/ dsitworkshopfinal.html 2000.
-
(2000)
-
-
-
7
-
-
30144436487
-
Dynamic analysis of malicious code: A windows operational system approach
-
November
-
Adriano Cansian,Thiago Siqueira,Cesar Atilio, Dynamic analysis of malicious code: a windows operational system approach, WSEAS transactions on computer, Issue 5, Volume 3. November 2004, pp. 1442-1450.
-
(2004)
WSEAS Transactions on Computer
, vol.3
, Issue.5
, pp. 1442-1450
-
-
Cansian, A.1
Siqueira, T.2
Atilio, C.3
-
9
-
-
84944248021
-
Intrusion detection using variable length audit trail patterns
-
A. Wespi, M.Dacier and H. Debar, Intrusion detection using variable length audit trail patterns. In RAID 2000, 2000, pp. 110-129.
-
(2000)
RAID 2000
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
10
-
-
0034316644
-
Modeling requests among cooperating intrusion detection systems
-
Peng Ning, X. Sean Wang, and Sushil Jajodia, Modeling requests among cooperating intrusion detection systems, Computer Communications, 2000, 23(17), pp. 1702-1715,
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1702-1715
-
-
Ning, P.1
Wang, X.S.2
Jajodia, S.3
-
11
-
-
0008968386
-
A query facility for common intrusion detection framework
-
Baltimore, MD, Oct
-
Pend Ning, X. Sean Wang, and Sushil Jajodia, A query facility for common intrusion detection framework, In proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD, Oct 2000, pp. 317-328.
-
(2000)
Proceedings of the 23rd National Information Systems Security Conference
, pp. 317-328
-
-
Ning, P.1
Wang, X.S.2
Jajodia, S.3
-
12
-
-
0036947485
-
Multicast-based Inference of Network-Internal Delay Distributions
-
F.Lo.Presti, N.G.Duffield, J.Horowitz, et al, Multicast-based Inference of Network-Internal Delay Distributions, IEEE/ACM Transactions on Networking, 2002, vol. 10, pp. 761-775.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, pp. 761-775
-
-
Presti, F.Lo.1
Duffield, N.G.2
Horowitz, J.3
-
13
-
-
0021404166
-
Maximum Likelihood and the EM Algorithm
-
R.A.Redner,H.F.Walker, Maximum Likelihood and the EM Algorithm, SIAM Review, 1984, 26(2), pp. 195-239.
-
(1984)
SIAM Review
, vol.26
, Issue.2
, pp. 195-239
-
-
Redner, R.A.1
Walker, H.F.2
-
14
-
-
0028428006
-
A Robust Back Propagation Learning Algorithm for Function Approximation
-
S.David Chen,C J.Ramesh. A Robust Back Propagation Learning Algorithm for Function Approximation. IEEE Tranx. ON NN. 1994, 5(3), pp. 467-479.
-
(1994)
IEEE Tranx. ON NN
, vol.5
, Issue.3
, pp. 467-479
-
-
Chen, S.D.1
Ramesh, C.J.2
-
15
-
-
43949164756
-
Simulated Annealink
-
Mathe Comput Modeling
-
Ingber L, Simulated Annealink, Practice Versus Theory, Mathe Comput Modeling, 1993, pp. 29-57.
-
(1993)
Practice Versus Theory
, pp. 29-57
-
-
Ingber, L.1
|