-
1
-
-
0028430224
-
Network intrusion detection
-
May/June
-
Biswanath Mukherjee, L. Todd Heberlein, and Karl N. Levitt, "Network intrusion detection," IEEE Network, 8(3): 26-41, May/June 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
2
-
-
0002473030
-
DIDS (Distributed Intrusion Detection System) - Motivation, architecture, and an early prototype
-
Washington D.C., October
-
S. Snapp et al, "DIDS (Distributed Intrusion Detection System) - Motivation, Architecture, and An Early Prototype," Proc. of the 14th National Computer Security Conference, pp. 167-176, Washington D.C., October 1991.
-
(1991)
Proc. of the 14th National Computer Security Conference
, pp. 167-176
-
-
Snapp, S.1
-
3
-
-
0141590483
-
Applying mobile agents to intrusion detection and response
-
National Institute of Standards and Technology, USA, October
-
W. Jansen, P. Mell, T. Karygiannis, and D. Marks, "Applying Mobile agents to Intrusion Detection and Response," NIST Interim report (IR) - 6416, National Institute of Standards and Technology, USA, October 1999.
-
(1999)
NIST Interim Report (IR)
, vol.6416
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
4
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
Seattle, Washington, USA, November
-
th System Administrations Conference, LISA '99, Seattle, Washington, USA, November 1999.
-
(1999)
th System Administrations Conference, LISA '99
-
-
Roesch, M.1
-
5
-
-
0027748352
-
Analysis of an algorithm for distributed recognition and accountability
-
Fairfax, VA, Nov.
-
Ko, D. Frincke, T. Goan, L. T. Heberlein, K. Levitt, B. Mukherjee, and C. Wee, "Analysis of an Algorithm for Distributed Recognition and Accountability," Proceedings of the first ACM Conference on Computer and Communication Security. Fairfax, VA, Nov. 1993.
-
(1993)
Proceedings of the First ACM Conference on Computer and Communication Security
-
-
Ko1
Frincke, D.2
Goan, T.3
Heberlein, L.T.4
Levitt, K.5
Mukherjee, B.6
Wee, C.7
-
6
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
G. White, E. Fisch, and U. Pooch, "Cooperating security managers: A peer-based intrusion detection system," IEEE Network, 10(1): 20-23, 1994.
-
(1994)
IEEE Network
, vol.10
, Issue.1
, pp. 20-23
-
-
White, G.1
Fisch, E.2
Pooch, U.3
-
7
-
-
0003750241
-
An architecture for intrusion detection using autonomous agents
-
Purdue University, USA
-
J. Balasubramaniyan, J. O. G. Fernandez, D. Isacoff, E. H. Spafford, and D. Zamboni, "An Architecture for Intrusion Detection using Autonomous Agents," Technical report no. TR 98-05, Purdue University, USA, 1998.
-
(1998)
Technical Report No. TR 98-05
, vol.TR 98-05
-
-
Balasubramaniyan, J.1
Fernandez, J.O.G.2
Isacoff, D.3
Spafford, E.H.4
Zamboni, D.5
-
8
-
-
0003337684
-
A method of tracing intruders by use of mobile agents
-
San Jose, USA, June
-
M. Asaka, S. Okazawa, A. Taguchi, and S. Goto, "A Method of Tracing Intruders by Use of Mobile Agents," INET '99, San Jose, USA, June 1999.
-
(1999)
INET '99
-
-
Asaka, M.1
Okazawa, S.2
Taguchi, A.3
Goto, S.4
-
9
-
-
24744452201
-
Intrusion detection with mobile agents
-
Stockholm, Sweden, June
-
N. Foukia, J. Hulaas, and J. Harms, "Intrusion Detection with Mobile Agents," Proceedings of the 11th Annual Internet Society Conference (INET 2001), Stockholm, Sweden, June 2001.
-
(2001)
Proceedings of the 11th Annual Internet Society Conference (INET 2001)
-
-
Foukia, N.1
Hulaas, J.2
Harms, J.3
-
10
-
-
0038729639
-
Lightweight agents for intrusion detection
-
Elsevier
-
G. Helmer, J. Wong, Y. Wang, V. Honavar, and Les Miller, "Lightweight Agents for Intrusion Detection," Journal of Systems and Software, Elsevier, vol. 67, pp. 109-122, 2003.
-
(2003)
Journal of Systems and Software
, vol.67
, pp. 109-122
-
-
Helmer, G.1
Wong, J.2
Wang, Y.3
Honavar, V.4
Miller, L.5
-
11
-
-
33749372897
-
-
http://www.ifi.unizh.ch/ddis/staff/vorburg/doc/Orb/index.htm
-
Recursion Software Inc, "Voyager ORB Developer's Guide," www.objectspace.com, http://www.ifi.unizh.ch/ddis/staff/vorburg/doc/Orb/index. htm
-
Voyager ORB Developer's Guide
-
-
-
13
-
-
33749422386
-
-
University of California, Berkeley, CA
-
Van Jacobson, Craig Leres, and Steven McCanne, "Tcpdump - dump traffic on a network," University of California, Berkeley, CA, http://www.tcpdump.org.
-
Tcpdump - Dump Traffic on a Network
-
-
Van Jacobson1
Leres, C.2
McCanne, S.3
-
15
-
-
0003954474
-
-
National Institute of Standards and Technology, Gaithersburg, MD
-
Wayne Jansen, and Tom Karygiannis, "Mobile Agent Security," National Institute of Standards and Technology, Gaithersburg, MD, 1999.
-
(1999)
Mobile Agent Security
-
-
Jansen, W.1
Karygiannis, T.2
-
16
-
-
24744460284
-
Towards an intrusion detection system for pervasive computing environments
-
to appear, IEEE CS Press, Las Vegas, Nevada, USA, April
-
P. Kannadiga, M. Zulkernine, and S. Ahamed, "Towards an Intrusion Detection System for Pervasive Computing Environments," to appear, Proc. of the International Conference on Information Technology (ITCC), IEEE CS Press, Las Vegas, Nevada, USA, April 2005.
-
(2005)
Proc. of the International Conference on Information Technology (ITCC)
-
-
Kannadiga, P.1
Zulkernine, M.2
Ahamed, S.3
-
18
-
-
1542315906
-
A safe mobile agent system for distributed intrusion detection
-
Nov.
-
Shao-Chun Zhong, Qing-Feng Song, Xiao-Chun Cheng, and Yan Zhang, "A safe mobile agent system for distributed intrusion detection," Proc. of the International Conference on Machine Learning and Cybernetics, vol. 4, pp. 2009-2014, Nov. 2003.
-
(2003)
Proc. of the International Conference on Machine Learning and Cybernetics
, vol.4
, pp. 2009-2014
-
-
Zhong, S.-C.1
Song, Q.-F.2
Cheng, X.-C.3
Zhang, Y.4
|