-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
J. P. Anderson Co., Ft. Washington, Pennsylvania
-
Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, J. P. Anderson Co., Ft. Washington, Pennsylvania (1980)
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
3
-
-
26444598206
-
On the detection of anomalous system call arguments
-
Kruegel, C., Mutz, D., Valeur, F., Vigna, G.: On the detection of anomalous system call arguments. In: Proc. of ESORICS 2003. (2003)
-
(2003)
Proc. of ESORICS 2003
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
5
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Calgary, Canada
-
Ptacek, T.H., Newsham, T.N.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical Report T2R-0Y6, Secure Networks, Calgary, Canada (1998)
-
(1998)
Technical Report
, vol.T2R-0Y6
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
6
-
-
0344008570
-
Detecting novel attacks by identifying anomalous network packet headers
-
Florida Institute of Technology
-
Mahoney, M., Chan, P.: Detecting novel attacks by identifying anomalous network packet headers. Technical Report CS-2001-2, Florida Institute of Technology (2001)
-
(2001)
Technical Report
, vol.CS-2001-2
-
-
Mahoney, M.1
Chan, P.2
-
8
-
-
2442537609
-
NSOM: A real-time network-based intrusion detection system using self-organizing maps
-
Dept. of Applied Science, University of California, Davis
-
Labib, K., Vemuri, R.; NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis (2002)
-
(2002)
Technical Report
-
-
Labib, K.1
Vemuri, R.2
-
12
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: RAID Symposium. (2004)
-
(2004)
RAID Symposium
-
-
Wang, K.1
Stolfo, S.J.2
-
16
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. on Information and System Security 3 (2000) 262-294
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
17
-
-
0034592923
-
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms
-
Yamanishi, K., ichi Takeuchi, J., Williams, G.J., Milne, P.: On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. In: Proc. of the 6th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining. (2000) 320-324
-
(2000)
Proc. of the 6th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining
, pp. 320-324
-
-
Yamanishi, K.1
Ichi Takeuchi, J.2
Williams, G.J.3
Milne, P.4
|