-
2
-
-
1242263788
-
Mitigation of network tampering using dynamic dispatch of mobile agents
-
www.elsevier.com/locate/cose
-
DeMara R.F., and Rocke A.J. Mitigation of network tampering using dynamic dispatch of mobile agents. Computers and Security vol. 23 (2004) 31-42. http:www.elsevier.com/locate/cose www.elsevier.com/locate/cose
-
(2004)
Computers and Security
, vol.23
, pp. 31-42
-
-
DeMara, R.F.1
Rocke, A.J.2
-
3
-
-
1242318271
-
-
Available from: http://snortnet.scorpions.net/snortnet.pdf
-
Fyodor Y. 'SNORTNET'-A Distributed Intrusion Detection System (2000 (June)). http://snortnet.scorpions.net/snortnet.pdf Available from: http://snortnet.scorpions.net/snortnet.pdf
-
(2000)
'SNORTNET'-A Distributed Intrusion Detection System
-
-
Fyodor, Y.1
-
8
-
-
0037002475
-
Intrusion detection: a brief history and overview. Reliable Software Group, Computer Science Department, University of California Santa Barbara
-
Kemmerer R.A., and Vigna G. Intrusion detection: a brief history and overview. Reliable Software Group, Computer Science Department, University of California Santa Barbara. Supplement to Computer Security and Privacy (2002) 27-30
-
(2002)
Supplement to Computer Security and Privacy
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
9
-
-
0242468747
-
An anomaly intrusion detection method by clustering normal user behavior
-
Oh S.H., and Lee W.S. An anomaly intrusion detection method by clustering normal user behavior. Computers & Security 22 7 (2003) 596-612
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 596-612
-
-
Oh, S.H.1
Lee, W.S.2
-
10
-
-
84904888755
-
Attacking DDoS at the source
-
Mirkovic J., Prier G., and Reiher P. Attacking DDoS at the source. Proceedings of ICNP 2002, Paris, France (2002) 312-321
-
(2002)
Proceedings of ICNP 2002, Paris, France
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
12
-
-
0041608419
-
CARDS: a distributed system for detecting coordinated attacks
-
Qing S., and Elof J.H.P. (Eds), Kluwer Academic Publishers
-
Yang J., Ning P., Wang X., and Jajodia S. CARDS: a distributed system for detecting coordinated attacks. In: Qing S., and Elof J.H.P. (Eds). Proceedings of IFIP TC11 Sixteenth Annual Working Conference on Information Security (SEC 2000) (2000), Kluwer Academic Publishers
-
(2000)
Proceedings of IFIP TC11 Sixteenth Annual Working Conference on Information Security (SEC 2000)
-
-
Yang, J.1
Ning, P.2
Wang, X.3
Jajodia, S.4
-
13
-
-
51149105210
-
-
Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management, Seattle, WA, May 14-18
-
Cabrera J.B.D., Lewis L., Qin X., Lee W., Prasanth R., Ravichandran K., and Mehra B. Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study. Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management, Seattle, WA, May 14-18 (2001)
-
(2001)
Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Prasanth, R.5
Ravichandran, K.6
Mehra, B.7
-
17
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Lee W., Stolfo S.J., and Mok K.W. A data mining framework for building intrusion detection models. Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA (1999 (May 9-12)) 120-132
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
19
-
-
0031640906
-
Abstraction-based misuse detection: high-level specification and adaptable strategies
-
Lin J., Wang X.S., and Jajodia S. Abstraction-based misuse detection: high-level specification and adaptable strategies. Proceedings of the 11th Computer Security Foundation Workshop (Rockport, MA, June) (1998) 190-201
-
(1998)
Proceedings of the 11th Computer Security Foundation Workshop (Rockport, MA, June)
, pp. 190-201
-
-
Lin, J.1
Wang, X.S.2
Jajodia, S.3
-
22
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6 4 (2003) 443-471
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
23
-
-
0242637092
-
Detecting intrusion with rule-based integration of multiple models
-
Han S., and Cho S. Detecting intrusion with rule-based integration of multiple models. Computers & Security 22 7 (2003) 613-623
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 613-623
-
-
Han, S.1
Cho, S.2
-
26
-
-
85006413597
-
-
Proceedings of 14th Systems Administration Conference (LISA 2000), New Orleans, Louisiana, USA
-
Dietrich S., Long N., and Dittrich D. Analyzing distributed denial of service tools: the shaft case. Proceedings of 14th Systems Administration Conference (LISA 2000), New Orleans, Louisiana, USA (2000)
-
(2000)
Analyzing distributed denial of service tools: the shaft case
-
-
Dietrich, S.1
Long, N.2
Dittrich, D.3
-
28
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang Y., Lee W., and Huang Y. Intrusion detection techniques for mobile wireless networks. ACM Wireless Networks 9 (2003) 545-556
-
(2003)
ACM Wireless Networks
, vol.9
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
30
-
-
33746119684
-
-
H. Debar, M. Dacier, A. Wespi, S. Lampart, An Experimentation Workbench for Intrusion Detection Systems, Research Report RZ 2998, IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, March (1998).
-
-
-
-
31
-
-
84962260018
-
-
Proceedings of DARPA Information Survivability Conference and Exposition, DISCEX'OO, Jan 25-27, Hilton Head, SC
-
Lippmann R., and Graf I. Evaluating intrusion detection systems: the 1998 DARPA Off-line intrusion detection evaluation. Proceedings of DARPA Information Survivability Conference and Exposition, DISCEX'OO, Jan 25-27, Hilton Head, SC (2000)
-
(2000)
Evaluating intrusion detection systems: the 1998 DARPA Off-line intrusion detection evaluation
-
-
Lippmann, R.1
Graf, I.2
-
32
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Puketza N., Zhang K., Chung M., Mukherjee B., and Olsson R. A methodology for testing intrusion detection systems. IEEE Transactions on Software Engineering 22 10 (1996 (Oct)) 719-729
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.5
-
33
-
-
0024984013
-
A network security monitor
-
Heberlein T., Dias G., Levit K., Mukherjee B., Wood J., and Wolber D. A network security monitor. Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy (1990) 296-304
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, T.1
Dias, G.2
Levit, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
34
-
-
33746137945
-
-
Proceedings of Second International Conference on Web Information Systems Engineering (WISE'01) 0-7965-1393-X/02 IEEE
-
Shiyong Z., Chengrong W., and Wei G. Network monitoring in broadband. Proceedings of Second International Conference on Web Information Systems Engineering (WISE'01) (2002) 0-7965-1393-X/02 IEEE
-
(2002)
Network monitoring in broadband
-
-
Shiyong, Z.1
Chengrong, W.2
Wei, G.3
|