-
2
-
-
84944721192
-
Log Correlation for Intrusion Detection: A Proof of Concept
-
Las Vegas, Nevada, USA
-
Abad, C., Taylor, J., Sengul, C., Zhou, Y., Yurcik, W., Rowe, K.: Log Correlation for Intrusion Detection: A Proof of Concept. In: Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA (2003)
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
-
-
Abad, C.1
Taylor, J.2
Sengul, C.3
Zhou, Y.4
Yurcik, W.5
Rowe, K.6
-
4
-
-
84862481753
-
-
Tripwire, Inc.: Tripwire, (http: //www.tripwire.com)
-
Tripwire
-
-
-
5
-
-
0041488497
-
-
CERT Coordination Center: Overview of Attack Trends, http://www.cert.org/ archive/pdf/attack_trends.pdf(2002)
-
(2002)
Overview of Attack Trends
-
-
-
6
-
-
0742276097
-
Inside the Slammer Worm
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer Worm. IEEE Security and Privacy 1 (2003) 33-39
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
7
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
Washington, DC
-
Pennington, A., Strunk, J., Griffin, J., Soules, C., Goodson, G., Ganger, G.: Storage-based intrusion detection: Watching storage activity for suspicious behavior. In: Proceedings of 12th USENIX Security Symposium, Washington, DC (2003)
-
(2003)
Proceedings of 12th USENIX Security Symposium
-
-
Pennington, A.1
Strunk, J.2
Griffin, J.3
Soules, C.4
Goodson, G.5
Ganger, G.6
-
9
-
-
0032624581
-
Matrices, vector spaces, and information retrieval
-
Berry, M.W., Drmac, Z., Jessup, E.R.: Matrices, vector spaces, and information retrieval. SIAM Review 41 (1999)
-
(1999)
SIAM Review
, vol.41
-
-
Berry, M.W.1
Drmac, Z.2
Jessup, E.R.3
-
11
-
-
15944427330
-
Detection of Outbreaks from Time Series Data Using Wavelet Transform
-
Omni Press CD
-
Zhang, J., Tsui, F., Wagner, M.M., Hogan, W.R.: Detection of Outbreaks from Time Series Data Using Wavelet Transform. In: AMIA Fall Symp., Omni Press CD (2003) 748-752
-
(2003)
AMIA Fall Symp.
, pp. 748-752
-
-
Zhang, J.1
Tsui, F.2
Wagner, M.M.3
Hogan, W.R.4
-
13
-
-
0000014486
-
Cluster analysis of multivariante data: Efficiency vs. Interpretability of classifications
-
Forgy, E.: Cluster analysis of multivariante data: Efficiency vs. Interpretability of classifications. Biometrics 21 (1965)
-
(1965)
Biometrics
, vol.21
-
-
Forgy, E.1
-
19
-
-
84874346155
-
-
PacketStorm: Packet Storm, (http: //www.packetstormsecurity.org)
-
Packet Storm
-
-
-
20
-
-
77949481197
-
-
SANS Institute: Lion Worm, http: //www.sans.org/y2k/lion.htm(2001)
-
(2001)
Lion Worm
-
-
-
24
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An architecture for intrusion detection using autonomous agents. In: Proceedings of the 14th IEEE Computer Security Applications Conference. (1998)
-
(1998)
Proceedings of the 14th IEEE Computer Security Applications Conference
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
26
-
-
84862471809
-
-
Planetlab: PlanetLab. (http: //www.planet-lab.org)
-
-
-
-
27
-
-
84862485056
-
-
Samhain Labs: Samhain. (http://la-samhna.de/samhain)
-
Samhain
-
-
-
29
-
-
0004204717
-
The Design of GrIDS: A Graph-Based Intrusion Detection System
-
U.C. Davis Computer Science Department
-
Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Rowe, J., Staniford-Chen, S., Yip, R., Zerkle, D.: The Design of GrIDS: A Graph-Based Intrusion Detection System. Technical Report CSE-99-2, U.C. Davis Computer Science Department (1999)
-
(1999)
Technical Report CSE-99-2
-
-
Cheung, S.1
Crawford, R.2
Dilger, M.3
Frank, J.4
Hoagland, J.5
Levitt, K.6
Rowe, J.7
Staniford-Chen, S.8
Yip, R.9
Zerkle, D.10
-
30
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
White, G., Fisch, E., Pooch, U.: Cooperating security managers: A peer-based intrusion detection system. IEEE Network 10 (1994)
-
(1994)
IEEE Network
, vol.10
-
-
White, G.1
Fisch, E.2
Pooch, U.3
-
31
-
-
84956999446
-
The DIDS (distributed intrusion detection system) prototype
-
San Antonio, Texas, USENIX Association
-
Snapp, S.R., Smaha, S.E., Teal, D.M., Grance, T.: The DIDS (distributed intrusion detection system) prototype. In: the Summer USENIX Conference, San Antonio, Texas, USENIX Association (1992) 227-233
-
(1992)
The Summer USENIX Conference
, pp. 227-233
-
-
Snapp, S.R.1
Smaha, S.E.2
Teal, D.M.3
Grance, T.4
-
34
-
-
84958963784
-
Analyzing Intensive Intrusion Alerts Via Correlation
-
Springer-Verlag
-
Ning, P., Cui, Y., Reeves, D.S.: Analyzing Intensive Intrusion Alerts Via Correlation. In: Recent Advances in Intrusion Detection, Volume 2516 of Lecture Notes in Computer Science, Springer-Verlag (2002)
-
(2002)
Recent Advances in Intrusion Detection, Volume 2516 of Lecture Notes in Computer Science
, vol.2516
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
35
-
-
34748911065
-
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting
-
Wang, H., Hu, Y., Yuan, C., Zhang, Z.: Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. In: Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS). (2004)
-
(2004)
Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS)
-
-
Wang, H.1
Hu, Y.2
Yuan, C.3
Zhang, Z.4
|