-
1
-
-
0024984013
-
A network security monitor
-
Heberlein L, Dias GV, Levitt KN, Mukherjee B, Wood J, Wolber D. A network security monitor. In: Proc. of the IEEE Computer Society Symp. Research in Security and Privacy. 1990. 296-304. http://seclab.cs.ucdavis.edu/papers/pdfs/th-gd-90.pdf
-
(1990)
Proc. of the IEEE Computer Society Symp. Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
2
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
Debar H., Mé L. and Wu S.F.(ed.), LNCS 1907, Heidelberg: Springer-Verlag
-
Valdes A, Skinner K. Adaptive, model-based monitoring for cyber attack detection. In: Debar H, Mé L, Wu SF, eds. Proc. of the 3rd Int'l Workshop on the Recent Advances in Intrusion Detection (RAID 2000). LNCS 1907, Heidelberg: Springer-Verlag, 2000. 80-92.
-
(2000)
Proc. of the 3rd Int'l Workshop on the Recent Advances in Intrusion Detection (RAID 2000)
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
3
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
Staniford S, Hoagland JA, McAlerney JM. Practical automated detection of stealthy portscans. Journal of Computer Security, 2002, 10(1/2): 105-136.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
4
-
-
2542531740
-
A machine learning approach to detecting attacks by identifying anomalies in network traffic
-
Melbourne: Florida Institute of Technology
-
Mahoney VM. A machine learning approach to detecting attacks by identifying anomalies in network traffic[Ph.D. Thesis]. Melbourne: Florida Institute of Technology, 2003.
-
(2003)
-
-
Mahoney, V.M.1
-
5
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Jonsson E., Valdes A. and Almgren M.(ed.), LNCS 3224, Heidelberg: Springer-Verlag
-
Wang K, Stolfo SJ. Anomalous payload-based network intrusion detection. In: Jonsson E, Valdes A, Almgren M, eds. Proc. of the 7th Int'l Symp. on Recent Advances in Intrusion Detection (RAID 2004). LNCS 3224, Heidelberg: Springer-Verlag, 2004. 203-222.
-
(2004)
Proc. of the 7th Int'l Symp. on Recent Advances in Intrusion Detection (RAID 2004)
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
6
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
Lamont G.B., Haddad H., Papadopoulos G. and Panda B.(ed.), New York: ACM Press
-
Krugel C, Toth T, Kirda E. Service specific anomaly detection for network intrusion detection. In: Lamont GB, Haddad H, Papadopoulos G, Panda B, eds. Proc. of the 2002 ACM Symp. on Applied Computing. New York: ACM Press, 2002. 201-208.
-
(2002)
Proc. of the 2002 ACM Symp. on Applied Computing
, pp. 201-208
-
-
Krugel, C.1
Toth, T.2
Kirda, E.3
-
7
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W, Stolfo SJ. A framework for constructing features and models for intrusion detection systems. ACM Trans. on Information and System Security, 2000, 3(4): 227-261.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
8
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
Manikopoulos C, Papavassiliou S. Network intrusion and fault detection: A statistical anomaly approach. IEEE Communications Magazine, 2002, 40(10): 76-82.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
9
-
-
0038103863
-
An anomaly detection method based on fuzzy judgment
-
Chinese source
-
Zhang J, Gong J. An anomaly detection method based on fuzzy judgment. Journal of Computer Research and Development, 2003, 40(6): 776-783 (in Chinese with English abstract).
-
(2003)
Journal of Computer Research and Development
, vol.40
, Issue.6
, pp. 776-783
-
-
Zhang, J.1
Gong, J.2
-
10
-
-
33751017631
-
Immune system approaches to intrusion detection - A review
-
Nicosia G.(ed.), LNCS 3239, Heidelberg: Springer-Verlag
-
Aickelin U, Greensmith J, Twycross J. Immune system approaches to intrusion detection-A review. In: Nicosia G, et al., eds. Proc. of the 3rd Int'l Conf. on Artificial Immune Systems. LNCS 3239, Heidelberg: Springer-Verlag, 2004. 316-329.
-
(2004)
Proc. of the 3rd Int'l Conf. on Artificial Immune Systems
, pp. 316-329
-
-
Aickelin, U.1
Greensmith, J.2
Twycross, J.3
-
11
-
-
11244287524
-
An intrusion detection system based on support vector machine
-
Chinese source
-
Rao X, Dong CX, Yang SQ. An intrusion detection system based on support vector machine. Journal of Software, 2003, 14(4): 798-803 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/798.htm
-
(2003)
Journal of Software
, vol.14
, Issue.4
, pp. 798-803
-
-
Rao, X.1
Dong, C.X.2
Yang, S.Q.3
-
12
-
-
17944371143
-
Fuzzy multi-class support vector machine and application in intrusion detection
-
Chinese source
-
Li KL, Huang HK, Tian SF, Liu ZP, Liu ZQ. Fuzzy multi-class support vector machine and application in intrusion detection. Chinese Journal of Computers, 2005, 28(2): 274-280 (in Chinese with English abstract).
-
(2005)
Chinese Journal of Computers
, vol.28
, Issue.2
, pp. 274-280
-
-
Li, K.L.1
Huang, H.K.2
Tian, S.F.3
Liu, Z.P.4
Liu, Z.Q.5
-
13
-
-
21844463053
-
Network intrusion detection method based on multi-class support vector machine
-
Chinese source
-
Xiao Y, Han CH, Zheng QH, Wang Q. Network intrusion detection method based on multi-class support vector machine. Journal of Xi'an Jiaotong University, 2005, 39(6): 562-565 (in Chinese with English abstract).
-
(2005)
Journal of Xi'an Jiaotong University
, vol.39
, Issue.6
, pp. 562-565
-
-
Xiao, Y.1
Han, C.H.2
Zheng, Q.H.3
Wang, Q.4
-
14
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA offline intrusion detection system evaluation as performed by Lincoln laboratory
-
McHugh J. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA offline intrusion detection system evaluation as performed by Lincoln laboratory. ACM Trans. on Information and System Security, 2000, 3(4): 262-294.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
15
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore
-
Porras PA, Neumann PG. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conf. Baltimore. 1997. 353-365. http://www.csl.sri.com/papers/emerald-niss97/
-
(1997)
Proc. of the 20th National Information Systems Security Conf
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
16
-
-
0000516376
-
Upper and lower probabilities induced by multivalued mapping
-
Dempster A. Upper and lower probabilities induced by multivalued mapping. Annals of Mathematical Statistics, 1967, 38(2): 325-339.
-
(1967)
Annals of Mathematical Statistics
, vol.38
, Issue.2
, pp. 325-339
-
-
Dempster, A.1
-
17
-
-
2442505788
-
Towards multisensor data fusion for DoS detection
-
Haddad H.M., Omicini A., Wainwright R.L. and Liebrock L.M.(ed.), New York: ACM Press
-
Siaterlis C, Maglaris B. Towards multisensor data fusion for DoS detection. In: Haddad HM, Omicini A, Wainwright RL, Liebrock LM, eds. Proc. of the 2004 ACM Symp. on Applied Computing. New York: ACM Press, 2004. 439-446.
-
(2004)
Proc. of the 2004 ACM Symp. on Applied Computing
, pp. 439-446
-
-
Siaterlis, C.1
Maglaris, B.2
-
18
-
-
0025460756
-
Dempster's rule of combination is #P-complete
-
Orponen P. Dempster's rule of combination is #P-complete. Artificial Intelligence, 1990, 44(1-2): 245-253.
-
(1990)
Artificial Intelligence
, vol.44
, Issue.1-2
, pp. 245-253
-
-
Orponen, P.1
|