-
2
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P. Anderson Co., Fort Washington, PA
-
ANDERSON, J. P. 1980. Computer security threat monitoring and surveillance. Tech. rep., James P. Anderson Co., Fort Washington, PA.
-
(1980)
Tech. Rep.
-
-
Anderson, J.P.1
-
4
-
-
0003907293
-
-
Macmillan Technology Publishing
-
BACE, R. 2000. Intrusion Detection. Macmillan Technology Publishing.
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
9
-
-
0004225165
-
Intrusion detection message exchange format data model and extensible markup language (XML) document type definition
-
draft-ietf-idwg-idmef-xml-03.txt
-
CURRY, D. AND DEBAR, H. 2001. Intrusion detection message exchange format data model and extensible markup language (XML) document type definition. Internet Draft, draft-ietf-idwg-idmef-xml-03.txt.
-
(2001)
Internet Draft
-
-
Curry, D.1
Debar, H.2
-
12
-
-
35248841190
-
-
Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/
-
DEFCON. 2000. DEFCON Capture the Flag (CTF) contest. Available at http://www.defcon.org/html/defcon-8-post.html. Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/.
-
(2000)
DEFCON Capture the Flag (CTF) Contest
-
-
-
13
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
ECKMANN, S., VIGNA, G., AND KEMMERER, R. 2002. STATL: An attack language for state-based intrusion detection. J. Comput. Secur. 10, 1/2, 71-104.
-
(2002)
J. Comput. Secur.
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.1
Vigna, G.2
Kemmerer, R.3
-
16
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
ILGUN, K., KEMMERER, R. A., AND PORRAS, P. A. 1995. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21, 3, 181-199.
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
23
-
-
0031640906
-
Abstraction-based misuse detection: High-level specifications and adaptable strategies
-
Rockport, MA
-
LIN, J., WANG, X. S., AND JAJODIA, S. 1998. Abstraction-based misuse detection: High-level specifications and adaptable strategies. In Proceedings of the 11th Computer Security Foundations Workshop, Rockport, MA. 190-201.
-
(1998)
Proceedings of the 11th Computer Security Foundations Workshop
, pp. 190-201
-
-
Lin, J.1
Wang, X.S.2
Jajodia, S.3
-
24
-
-
0034301662
-
A data mining analysis of RTID alarms
-
MANGANARIS, S., CHRISTENSEN, M., ZERKLE, D., AND HERMIZ, K. 2000. A data mining analysis of RTID alarms. Comput. Netw. 34, 571-577.
-
(2000)
Comput. Netw.
, vol.34
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
26
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
MORIN, B., MÉ, L., DEBAR, H., AND DUCASSÉ, M. 2002. M2D2: A formal data model for IDS alert correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002). 115-137.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
27
-
-
0028430224
-
Network intrusion detection
-
MUKHERJEE, B., HEBERLEIN, L. T., AND LEVITT, K. N. 1994. Network intrusion detection. IEEE Netw. 8, 3 (May), 26-41.
-
(1994)
IEEE Netw.
, vol.8
, Issue.3 MAY
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
28
-
-
84958963784
-
Analyzing intensive intrusion alerts via correlation
-
Zurich, Switzerland
-
NING, P., CUI, Y., AND REEVES, D. S. 2002a. Analyzing intensive intrusion alerts via correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland. 74-94.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 74-94
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
29
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, DC
-
NING, P., CUI, Y., AND REEVES, D. S. 2002b. Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington, DC. 245-254.
-
(2002)
Proceedings of the Ninth ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
30
-
-
84883386223
-
Abstraction-based intrusion detection in distributed environments
-
NING, P., JAJODIA, S., AND WANG, X. S. 2001. Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4, 4 (Nov.), 407-452.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.4 NOV.
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
34
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
SHEYNER, O., HAINES, J., JHA, S., LIPPMANN, R., AND WING, J. 2002. Automated generation and analysis of attack graphs. In Proceedings of IEEE Symposium on Security and Privacy.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
35
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
STANIFORD, S., HOAGLAND, J., AND MCALERNEY, J. 2002. Practical automated detection of stealthy portscans. J. Comput. Secur. 10, 1/2, 105-136.
-
(2002)
J. Comput. Secur.
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
-
36
-
-
0000949239
-
GrIDS - A graph based intrusion detection system for large networks
-
STANIFORD-CHEN, S., CHEUNG, S., CRAWFORD, R., DILGER, M., FRANK, J., HOAGLAND, J., LEVITT, K., WEE, C., YIP, R., AND ZERKLE, D. 1996. GrIDS - A graph based intrusion detection system for large networks. In Proceedings of the 19th National Information Systems Security Conference, Vol. 1. 361-370.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
, vol.1
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
39
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
VIGNA, G. AND KEMMERER, R. A. 1999. NetSTAT: A network-based intrusion detection system. J. Comput. Secur. 7, 1, 37-71.
-
(1999)
J. Comput. Secur.
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
40
-
-
84862374421
-
-
XERCES2 JAVA PARSER
-
XERCES2 JAVA PARSER. Available at http://xml.apache.org/xerces2-j/index. html.
-
-
-
|