-
2
-
-
31044438606
-
-
Online, date accessed: October 2003
-
CERT Coordination Center, 2003a. FTP bounce. Online, date accessed: October 2003. Available from: < http://www.cert.org/advisories/CA-1997-27. html >.
-
(2003)
FTP Bounce
-
-
-
3
-
-
31044449647
-
-
2003
-
CERT Coordination Center, 2003b. Problems with the FTP PORT Command, 2003. Available from: < http://www.cert.org/tech_tips/ftp_port_attacks.html >
-
(2003)
Problems with the FTP PORT Command
-
-
-
4
-
-
31044439897
-
-
Online, date accessed: October 2003
-
CERT Coordination Center, 2003c. CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks. Online, date accessed: October 2003. Available from: < http://www.cert.org/advisories/CA-1996-21.html >.
-
(2003)
CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks
-
-
-
5
-
-
26444519175
-
-
Online, date accessed: October 2003
-
Denmark CPN Group at University of Aarhus, 2003. Design/CPN online. Online, date accessed: October 2003. Available from: < http://www.daimi.au. dk/designCPN/ >.
-
(2003)
Design/CPN Online
-
-
-
7
-
-
15944398393
-
A Software Fault Tree approach to requirements analysis of an intrusion detection system
-
G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, and R. Lutz A Software Fault Tree approach to requirements analysis of an intrusion detection system Requirements Engineering Journal 7 4 2002 207 220
-
(2002)
Requirements Engineering Journal
, vol.7
, Issue.4
, pp. 207-220
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
-
8
-
-
31044435365
-
-
Inc. Recursive Software. Voyager, 2003. Available from: < http://www.recursionsw.com/products/voyager/voyager.asp >.
-
(2003)
-
-
-
9
-
-
31044451553
-
-
Online, date accessed: October 2003
-
Information Security Lab, 2003. MAIDS Intrusion Detection System Project. Online, date accessed: October 2003. Available from: < http://latte.cs. iastate.edu/Research/Intrusion/index.html>.
-
(2003)
MAIDS Intrusion Detection System Project
-
-
-
10
-
-
31044450484
-
-
Online, date accessed: October 2003
-
Intrusion Detection Hotlist, 2003. Online, date accessed: October 2003. Available from: < http://www.cerias.purdue.edu/coast/ids/ >.
-
(2003)
Intrusion Detection Hotlist
-
-
-
12
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Lee, W., Stolfo, S., Mok. K., 1999. A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120-132.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
13
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, Maryland, October 1997
-
Porras, P.A., Neumann, P.G., 1997. EMERALD: event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 20th National Information Systems Security Conference, Baltimore, Maryland, October 1997, pp. 353-365.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
15
-
-
0026402266
-
A system for distributed intrusion detection
-
Digest of Papers, San Francisco, CA, February 1991
-
Snapp, S., Brentano, J., Dias, G., Goan, T., Heberlein, L., Ho, C., Levitt, K., Mukherjee, B., 1991. A system for distributed intrusion detection. In: COMPCON Spring'91, Digest of Papers, San Francisco, CA, February 1991, pp. 170-176.
-
(1991)
COMPCON Spring'91
, pp. 170-176
-
-
Snapp, S.1
Brentano, J.2
Dias, G.3
Goan, T.4
Heberlein, L.5
Ho, C.6
Levitt, K.7
Mukherjee, B.8
-
16
-
-
0034300682
-
Intrusion detection using autonomous agents
-
E.H. Spafford, and D. Zamboni Intrusion detection using autonomous agents Computer Networks 34 4 2000 547 570
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
17
-
-
31044449768
-
Towards a formal approach to the design and implementation of intrusion detection systems
-
submitted for publication
-
Wang, Y., Wong, J., Helmer, G., Miller, L., Honavar, V., Lutz. R., Towards a formal approach to the design and implementation of intrusion detection systems. International Journal of System Science, submitted for publication.
-
International Journal of System Science
-
-
Wang, Y.1
Wong, J.2
Helmer, G.3
Miller, L.4
Honavar, V.5
Lutz, R.6
|