-
2
-
-
0033281215
-
The base-rate fallacy and its implication for the difficulty of intrusion detection
-
S. Axelsson, The Base-Rate Fallacy and its Implication for the Difficulty of Intrusion Detection, in Proc. of ACM CCS, 1999.
-
(1999)
Proc. of ACM CCS
-
-
Axelsson, S.1
-
3
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Depart, of Computer Engineering, Chalmers University, march
-
S. Axelsson, Intrusion Detection Systems: A Survey and Taxonomy, Technical Report 99-15, Depart, of Computer Engineering, Chalmers University, march 2000.
-
(2000)
Technical Report
, vol.99
, Issue.15
-
-
Axelsson, S.1
-
5
-
-
33646060640
-
-
Cisco Flow Collector Overview, http://www.cisco.com//univercdcc/td/doc/ product/rtrmgmt/nfc/nfc_3_0/nfc_ug/nfcover.pdf
-
Cisco Flow Collector Overview
-
-
-
6
-
-
84948958135
-
How to break a practical mix and design a new one
-
Proc. of Eurocrypt , Springer
-
Y. Desmedt and K. Kurosawa, How to Break a Practical Mix and Design a New One, in Proc. of Eurocrypt 2000, LNCS vol. 1807, Springer.
-
(2000)
LNCS
, vol.1807
-
-
Desmedt, Y.1
Kurosawa, K.2
-
7
-
-
0023294428
-
An intrusion detection model
-
D. E. Denning, An Intrusion Detection Model, in IEEE Transactions on Software Engineering, Vol. SE-13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
10
-
-
85009804743
-
New constructions for covering designs
-
D. Gordon, G. Kuperberg, and O. Patashnik, New Constructions for Covering Designs, Journal of Combinatorial Designs, 3 (1995), pp. 269-284.
-
(1995)
Journal of Combinatorial Designs
, vol.3
, pp. 269-284
-
-
Gordon, D.1
Kuperberg, G.2
Patashnik, O.3
-
11
-
-
0030210611
-
Asymptotically optimal covering designs
-
D. Gordon, G. Kuperberg, O. Patashnik, and J. Spencer, Asymptotically Optimal Covering Designs, Journal of Combinatorial Theory A, 75 (1996), pp. 220-240.
-
(1996)
Journal of Combinatorial Theory A
, vol.75
, pp. 220-240
-
-
Gordon, D.1
Kuperberg, G.2
Patashnik, O.3
Spencer, J.4
-
12
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser, and S. Micali, Probabilistic Encryption, in Journal of Computer and System Sciences, vol. 28, n. 2, 1984, pp. 270-299.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
16
-
-
33646029915
-
Is your computer being misused ? A survey of current intrusion detection system technology
-
N. McAuliffe, D. Wolcott, L. Schaefer, N. Kelem, B. Hubbard, and T. Haley, Is Your Computer Being Misused ? A Survey of Current Intrusion Detection System Technology, in Proc. of 6th IEEE Computer Security Applications Conference, 1990.
-
(1990)
Proc. of 6th IEEE Computer Security Applications Conference
-
-
McAuliffe, N.1
Wolcott, D.2
Schaefer, L.3
Kelem, N.4
Hubbard, B.5
Haley, T.6
-
17
-
-
33646045812
-
-
Netflow, IETF RFC, ftp://ftp.rfc-editor.org/innotes/rfc3954.txt
-
Netflow, IETF RFC
-
-
-
18
-
-
0002022607
-
Upper bounds for covering designs by simulated annealing
-
K. Nurmela and P. Ostergard, Upper Bounds for Covering Designs by Simulated Annealing, Congressum Numerantium, 96:93-111, 1993.
-
(1993)
Congressum Numerantium
, vol.96
, pp. 93-111
-
-
Nurmela, K.1
Ostergard, P.2
-
19
-
-
0039527186
-
An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme
-
R. Rees, D. R. Stinson, R. Wei and G. H. J. van Rees, An application of covering designs: Determining the maximum consistent set of shares in a threshold scheme, Ars Combinatoria 531 (1999), 225-237.
-
(1999)
Ars Combinatoria
, vol.531
, pp. 225-237
-
-
Rees, R.1
Stinson, D.R.2
Wei, R.3
Van Rees, G.H.J.4
-
21
-
-
0003938168
-
-
CRC Press, Boca Raton, FL (see D. R. Stinson, Coverings)
-
C. Colbourn and J. Dinitz, THE CRC HANDBOOK OF COMBINATORIAL DESIGNS, CRC Press, Boca Raton, FL 1996 (see D. R. Stinson, Coverings, pp. 260-265)
-
(1996)
The CRC Handbook of Combinatorial Designs
, pp. 260-265
-
-
Colbourn, C.1
Dinitz, J.2
-
22
-
-
33646036948
-
-
http://www.snort.org
-
-
-
-
24
-
-
85037867044
-
Theory and application of trapdoor functions
-
A. Yao, Theory and Application of Trapdoor Functions, in Proc. of FOCS 85.
-
Proc. of FOCS 85
-
-
Yao, A.1
|