메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 230-239

Watcher: The missing piece of the security puzzle

Author keywords

Computer science; Computer security; Hardware; Information security; Internet; Intrusion detection; Monitoring; Operating systems; Radio access networks; Software systems

Indexed keywords

COMPLEX NETWORKS; COMPUTER HARDWARE; COMPUTER SCIENCE; INTERNET; INTRUSION DETECTION; MERCURY (METAL); MONITORING; NETWORK SECURITY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33745462600     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2001.991539     Document Type: Conference Paper
Times cited : (15)

References (18)
  • 3
    • 0003411763 scopus 로고
    • A taxonomy of UNIX and network security vulnerabilities
    • M. Bishop, Technical Report 95-10, University of California at Davis, May
    • M. Bishop: A Taxonomy of UNIX and Network Security Vulnerabilities," M. Bishop, Technical Report 95-10, Department of Computer Science, University of California at Davis, May 1995
    • (1995) Department of Computer Science
    • Bishop, M.1
  • 4
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • February
    • D. Denning: An intrusion-detection model. IEEE Transactions on Software Engineering, Vol.13, No:2, pp.222-232, February 1987
    • (1987) IEEE Transactions on Software Engineering , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 6
    • 80052007699 scopus 로고    scopus 로고
    • A real-time intrusion detection system based on learning program behavior
    • Springer-Verlag, Toulouse, France, October
    • A.K. Ghosh, C. Michael and M. Schatz: A real-time intrusion detection system based on learning program behavior, Proceedings of theThird International Workshop, RAID 2000 , Springer-Verlag, Toulouse, France, pp. 93-109, October 2000
    • (2000) Proceedings of TheThird International Workshop, RAID 2000 , pp. 93-109
    • Ghosh, A.K.1    Michael, C.2    Schatz, M.3
  • 11
    • 0031233430 scopus 로고    scopus 로고
    • Intrusion detection via system call traces
    • Septemeber/October
    • A. P. Kosoresow and S. A. Hofmeyr, "Intrusion Detection via System Call Traces", IEEE Software, Septemeber/October 1997, pp. 35-42
    • (1997) IEEE Software , pp. 35-42
    • Kosoresow, A.P.1    Hofmeyr, S.A.2
  • 15
  • 18
    • 84880174811 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • IEEE Computer Society Press
    • C. Warrender, S. Forrest, and B. Pearlmutter: Detecting intrusions using system calls: alternative data models, IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp. 133-145, 1999
    • (1999) IEEE Symposium on Security and Privacy , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.