-
1
-
-
84949297542
-
Measuring security: A methodological approach
-
Stanford, CA, June
-
J. Alves-Foss, D. Frincke and J. Munson. Measuring Security: A Methodological Approach, International Workshop on Enterprise Security, Stanford, CA, June 1996
-
(1996)
International Workshop on Enterprise Security
-
-
Alves-Foss, J.1
Frincke, D.2
Munson, J.3
-
2
-
-
0003964874
-
Nextgeneration intrusion detection expert system (NIDES)
-
Menlo Park, CA, SRI-CSL-95-07, May
-
D. Anderson, T. Frivold and A. Valdez: Nextgeneration intrusion detection expert system (NIDES). Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA, SRI-CSL-95-07, May 1995
-
(1995)
Technical Report, Computer Science Laboratory, SRI International
-
-
Anderson, D.1
Frivold, T.2
Valdez, A.3
-
3
-
-
0003411763
-
A taxonomy of UNIX and network security vulnerabilities
-
M. Bishop, Technical Report 95-10, University of California at Davis, May
-
M. Bishop: A Taxonomy of UNIX and Network Security Vulnerabilities," M. Bishop, Technical Report 95-10, Department of Computer Science, University of California at Davis, May 1995
-
(1995)
Department of Computer Science
-
-
Bishop, M.1
-
4
-
-
0023294428
-
An intrusion-detection model
-
February
-
D. Denning: An intrusion-detection model. IEEE Transactions on Software Engineering, Vol.13, No:2, pp.222-232, February 1987
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
6
-
-
80052007699
-
A real-time intrusion detection system based on learning program behavior
-
Springer-Verlag, Toulouse, France, October
-
A.K. Ghosh, C. Michael and M. Schatz: A real-time intrusion detection system based on learning program behavior, Proceedings of theThird International Workshop, RAID 2000 , Springer-Verlag, Toulouse, France, pp. 93-109, October 2000
-
(2000)
Proceedings of TheThird International Workshop, RAID 2000
, pp. 93-109
-
-
Ghosh, A.K.1
Michael, C.2
Schatz, M.3
-
9
-
-
0027593257
-
NADIR: An automated system for detecting network intrusion and misuse
-
May
-
J. Hochberg, K. Jackson, C. Stallings, J. F. McClary, D. DuBois and J. Ford: NADIR: An automated system for detecting network intrusion and misuse. Computers &Security, Vol.12, No:3, pp.235-248, May 1993
-
(1993)
Computers &Security
, vol.12
, Issue.3
, pp. 235-248
-
-
Hochberg, J.1
Jackson, K.2
Stallings, C.3
McClary, J.F.4
DuBois, D.5
Ford, J.6
-
11
-
-
0031233430
-
Intrusion detection via system call traces
-
Septemeber/October
-
A. P. Kosoresow and S. A. Hofmeyr, "Intrusion Detection via System Call Traces", IEEE Software, Septemeber/October 1997, pp. 35-42
-
(1997)
IEEE Software
, pp. 35-42
-
-
Kosoresow, A.P.1
Hofmeyr, S.A.2
-
15
-
-
0029772905
-
A software blackbox recorder
-
IEEE Computer Society Press, Los Alamitos, CA, November
-
J. C. Munson, A Software Blackbox Recorder. Proceedings of the 1996 IEEE Aerospace Applications Conference, IEEE Computer Society Press, Los Alamitos, CA, November, pp. 309-320, 1996
-
(1996)
Proceedings of the 1996 IEEE Aerospace Applications Conference
, pp. 309-320
-
-
Munson, J.C.1
-
18
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
IEEE Computer Society Press
-
C. Warrender, S. Forrest, and B. Pearlmutter: Detecting intrusions using system calls: alternative data models, IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp. 133-145, 1999
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|