-
1
-
-
0004169830
-
-
Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, Chinchester, West Sussex, England, third edition
-
V. Barnett and T. Lewis. Outliers in Statistical Data. Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, Chinchester, West Sussex, England, third edition, 2000.
-
(2000)
Outliers in Statistical Data
-
-
Barnett, V.1
Lewis, T.2
-
2
-
-
0032124110
-
Information distance
-
C. H. Bennett, P. G'acs, M. Li, P. M. B. Vitanyi, and W. H. Zuerk. Information distance. IEEE Transactions on Information Theory, 44(4): 1407-1423, 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.4
, pp. 1407-1423
-
-
Bennett, C.H.1
G'acs, P.2
Li, M.3
Vitanyi, P.M.B.4
Zuerk, W.H.5
-
3
-
-
33750943135
-
-
October 27. Eindhoven, Netherlands
-
W. Bergmans. Maximum compression. http://www.maximumcompression.com, October 27, 2005. Eindhoven, Netherlands.
-
(2005)
-
-
Bergmans, W.1
-
4
-
-
33750931718
-
-
November 26
-
P. Bogaerts. Hping tutorial. http://www.radarhack.com/dir/papers/ hping2_v1.5.pdfl, November 26, 2005.
-
(2005)
Hping Tutorial
-
-
Bogaerts, P.1
-
6
-
-
0003594381
-
-
Duxbury Press, Pacific Grove, Cal., second edition
-
G. Casela and R. L. Berger. Statistical Inference. Duxbury Press, Pacific Grove, Cal., second edition, 2001.
-
(2001)
Statistical Inference
-
-
Casela, G.1
Berger, R.L.2
-
7
-
-
45749157480
-
The economic impact of cyber-attacks
-
Congressional Research Service The Library of Congress, April
-
B. Cashell, W. D. Jackson, M. Jickling, and B. Webel. The economic impact of cyber-attacks. CRS Report for Congress RL32331, Congressional Research Service The Library of Congress, April 2004.
-
(2004)
CRS Report for Congress RL32331
-
-
Cashell, B.1
Jackson, W.D.2
Jickling, M.3
Webel, B.4
-
8
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
June
-
S. Chebrolu, A. Abraham, and J. P. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24:295-307, June 2005.
-
(2005)
Computers & Security
, vol.24
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
9
-
-
84889281816
-
-
Wiley Series in Telecommunications. John Wiley and Sons, Inc., New York
-
T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley Series in Telecommunications. John Wiley and Sons, Inc., New York, 1991.
-
(1991)
Elements of Information Theory
-
-
Cover, T.M.1
Thomas, J.A.2
-
10
-
-
33750935964
-
-
February 2. the Center for Education and Research in Information Assurance (CERIAS), Purdue University, West Lafayette, Indiana
-
D. Curry. Intrusion detection systems. http://www.cerias.purdue.edu/ about/history/coast_resources/idcontent/ids.html, February 2, 2006. the Center for Education and Research in Information Assurance (CERIAS), Purdue University, West Lafayette, Indiana.
-
(2006)
Intrusion Detection Systems
-
-
Curry, D.1
-
13
-
-
33750953729
-
Network security though conservation of complexity
-
The Disneyland Resort, Anaheim, California, October
-
S. C. Evans and B. Barnett. Network security though conservation of complexity. In Proceedings of MILCOM, The Disneyland Resort, Anaheim, California, October 2003.
-
(2003)
Proceedings of MILCOM
-
-
Evans, S.C.1
Barnett, B.2
-
14
-
-
84964465779
-
Information assurance through kolmogorov complexity
-
Anaheim, California, June
-
S. C. Evans, S. F. Bush, and J. Hershey. Information assurance through kolmogorov complexity. In Proceedings of DARPA Information Survivability Conference and Exposition II, pages 322-331, Anaheim, California, June 2001.
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition II
, pp. 322-331
-
-
Evans, S.C.1
Bush, S.F.2
Hershey, J.3
-
15
-
-
33750819021
-
A two-stage complexity estimator
-
General Electric Research and Development Center, August 200
-
S. C. Evans and J. Hershey. A two-stage complexity estimator. Technical Information Series 2002GRC197, General Electric Research and Development Center, August 200.
-
Technical Information Series 2002GRC197
-
-
Evans, S.C.1
Hershey, J.2
-
16
-
-
33750934507
-
-
fyodor, November 26
-
fyodor. Port scanning techniques. http://www.insecure.org/nmap/man/man- port-scanning-techniques.html, November 26, 2005.
-
(2005)
Port Scanning Techniques
-
-
-
17
-
-
33750837824
-
-
August 30. the Carleton University, 1125 Colonel By Drive, Ottowa, Ontario, K1S5B6, Canada
-
J. Gilchrist. Archive compression test. http://www.compression.ca/act, August 30, 2005. the Carleton University, 1125 Colonel By Drive, Ottowa, Ontario, K1S5B6, Canada.
-
(2005)
Archive Compression Test
-
-
Gilchrist, J.1
-
18
-
-
2142714170
-
Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches
-
S. Goel and S. F. Bush. Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches. Complexity, 9(2):54-73, 2003.
-
(2003)
Complexity
, vol.9
, Issue.2
, pp. 54-73
-
-
Goel, S.1
Bush, S.F.2
-
19
-
-
33750964975
-
Dynamic modeling of internet traffic for intrusion detection
-
Anchorage, Alaska, July
-
E. Jonckheere, K. Shah, and S. Bohacek. Dynamic modeling of internet traffic for intrusion detection. In Proceedings of IEEE American Controls Conference, Anchorage, Alaska, July 2001.
-
(2001)
Proceedings of IEEE American Controls Conference
-
-
Jonckheere, E.1
Shah, K.2
Bohacek, S.3
-
21
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker bahavior
-
E. Jonsson and T. Olovsson. A quantitative model of the security intrusion process based on attacker bahavior. IEEE Transactions on Software Engineering, 23:235-245, 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
22
-
-
33750843323
-
-
JWS, August 30
-
JWS. Tcpdump public repository. http://www.tcpdump.org/, August 30, 2005.
-
(2005)
Tcpdump Public Repository
-
-
-
23
-
-
0031232091
-
The miraculous universal distribution
-
W. Kirchherr, M. Li, and P. Vitanyi. The miraculous universal distribution. The Mathematical Intelligencer, 19(4):7-15, 1997.
-
(1997)
The Mathematical Intelligencer
, vol.19
, Issue.4
, pp. 7-15
-
-
Kirchherr, W.1
Li, M.2
Vitanyi, P.3
-
24
-
-
0001902056
-
Three approaches to the quantitative definition of information
-
A. N. Kolmogorov. Three approaches to the quantitative definition of information. Problems of Information Transmission, 1:4-7, 1965.
-
(1965)
Problems of Information Transmission
, vol.1
, pp. 4-7
-
-
Kolmogorov, A.N.1
-
25
-
-
84937652953
-
Logical basis for information theory and probability theory
-
A. N. Kolmogorov. Logical basis for information theory and probability theory. IEEE Transactions on Information Theory, IT-14:662-664, 1968.
-
(1968)
IEEE Transactions on Information Theory
, vol.IT-14
, pp. 662-664
-
-
Kolmogorov, A.N.1
-
27
-
-
0013347997
-
Detecting distributed denial of service attacks using kolmogorov complexity
-
General Electric Research and Development Center, December
-
A. Kulkarni, S. F. Bush, and S. C. Evans. Detecting distributed denial of service attacks using kolmogorov complexity. Technical Information Series 2001crd176, General Electric Research and Development Center, December 2001.
-
(2001)
Technical Information Series 2001crd176
-
-
Kulkarni, A.1
Bush, S.F.2
Evans, S.C.3
-
28
-
-
0242476921
-
A comparative study of anomaly detection schemes in network intrusion detection
-
San Francisco, California, May
-
A. Lazarevic, L. Ertoz, A. Ozgur, J. Srivastava, and V. Kumar. A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of Third SIAM Conference on Data Mining, San Francisco, California, May 2003.
-
(2003)
Proceedings of Third SIAM Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Ozgur, A.3
Srivastava, J.4
Kumar, V.5
-
31
-
-
38549151192
-
-
October 27. the Florida Institute of Technology, 150 W. University Blvd. Melbourne, FL 32901, USA
-
M. Mahoney. The paq data compression programs. http://www.cs.fit.edu/ mmahoney/compression/, October 27, 2005. the Florida Institute of Technology, 150 W. University Blvd. Melbourne, FL 32901, USA.
-
(2005)
The Paq Data Compression Programs
-
-
Mahoney, M.1
-
33
-
-
26444534457
-
Mitigating network denial of service through diversity-based traffic management
-
New York, New York, June 7-10. Springer
-
A. Matrawy, P. van Oorschot, and A. Somayaji. Mitigating network denial of service through diversity-based traffic management. In Proceedings of Applied Cryptography and Network Security: Third International Conference (ACNS 2005), number LNCS 3531, pages 104-121, New York, New York, June 7-10 2005. Springer.
-
(2005)
Proceedings of Applied Cryptography and Network Security: Third International Conference (ACNS 2005)
, vol.LNCS 3531
, pp. 104-121
-
-
Matrawy, A.1
Van Oorschot, P.2
Somayaji, A.3
-
34
-
-
33750959529
-
-
October 27. the Visicron Corp., 3 Bethesda Metro Center, Suite #700, Bethesda, Maryland, 20814, USA
-
M. Nelson. Benchmarks. http://www.data-compression.info/Benchmarks.shtml, October 27, 2005. the Visicron Corp., 3 Bethesda Metro Center, Suite #700, Bethesda, Maryland, 20814, USA.
-
(2005)
-
-
Nelson, M.1
-
35
-
-
1342280323
-
-
Hewlett-Packard Professional Books. Prentice Hall PTR, Upper SaddleRiver, New Jersey
-
R. W. Potter. The Art of Measurement Theory and Practice. Hewlett-Packard Professional Books. Prentice Hall PTR, Upper SaddleRiver, New Jersey, 2000.
-
(2000)
The Art of Measurement Theory and Practice
-
-
Potter, R.W.1
-
36
-
-
33750932288
-
-
October 27. the Department of Computer Science and Software Engineering, University of Canterbury, Christchurch, New Zealand
-
M. Powell. Canterbury corpus. http://www.corpus.canterbury.ac.nz, October 27, 2005. the Department of Computer Science and Software Engineering, University of Canterbury, Christchurch, New Zealand.
-
(2005)
-
-
Powell, M.1
-
39
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
Sophia Antipolis, French Riviera, France, September 15-17
-
K. Wang and S. J. Stolfo. Anomalous payload-based network intrusion detection. In Proceedings of RAID'04, Sophia Antipolis, French Riviera, France, September 15-17 2004.
-
(2004)
Proceedings of RAID'04
-
-
Wang, K.1
Stolfo, S.J.2
|