-
1
-
-
0037001741
-
Towards the Scalable Implementation of a User Level Anomaly Detection System
-
Anaheim, CA, October
-
R. Chinchani, S. Upadhyaya, and K. Kwiat, "Towards the Scalable Implementation of a User Level Anomaly Detection System, " IEEE MIL-COM 2002, Anaheim, CA, October 2002.
-
(2002)
IEEE MIL-COM 2002
-
-
Chinchani, R.1
Upadhyaya, S.2
Kwiat, K.3
-
3
-
-
0031153727
-
Globus:A Metacomput-ing Infrastructure Toolkit
-
L Foster, C. Kesselman, "Globus:A Metacomput-ing Infrastructure Toolkit, " Intl J. Supercomputer Applications, Vol. 11, No. 2, pp 115-128, 1997.
-
(1997)
Intl J. Supercomputer Applications
, vol.11
, Issue.2
, pp. 115-128
-
-
Foster, L1
Kesselman, C.2
-
4
-
-
84956859986
-
A Flexible Security System for Metacomputing Environments
-
April
-
A. Ferrari, F. Knabe, M. Humphrey, S. Chapin, A. Grimshaw, "A Flexible Security System for Metacomputing Environments, " High Performance Computing and Networking Europe (HPCN Europe 99), pp 370-380, April, 1999.
-
(1999)
High Performance Computing and Networking Europe (HPCN Europe 99)
, pp. 370-380
-
-
Ferrari, A.1
Knabe, F.2
Humphrey, M.3
Chapin, S.4
Grimshaw, A.5
-
5
-
-
0032218229
-
A Security Architecture for Computational Grids
-
I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, "A Security Architecture for Computational Grids, " In Proc. 5th ACM Conference on Computer and Communications Security Conference, pp 83-92, 1998.
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security Conference
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
6
-
-
0004006446
-
-
Tech Report CS-94-21, University of Virginia
-
A. Grimshaw, W. Wulf, J. French, A. Weaver, P. Reynolds, Jr., "Legion: The next logical step toward a nationwide virtual computer, " Tech Report CS-94-21, University of Virginia, 1994.
-
(1994)
Legion: The next logical step toward a nationwide virtual computer
-
-
Grimshaw, A.1
Wulf, W.2
French, J.3
Weaver, A.4
Reynolds, P.5
-
7
-
-
33646828290
-
Trust Models and NetShield Architecture for Securing Grid Computing
-
submitted to the Kluwer Academic Publisher, May
-
K. Hwang, S. Tanachaiwiwat, "Trust Models and NetShield Architecture for Securing Grid Computing, " submitted to the Journal of Grid Computing, Kluwer Academic Publisher, May 2003.
-
(2003)
Journal of Grid Computing
-
-
Hwang, K.1
Tanachaiwiwat, S.2
-
8
-
-
0038021028
-
A Comparative Study on Feature Selection and Classification Methods Using Gene Expression Proteomics and Proteomic Patterns
-
H. Liu, J. Li, L. Wong, "A Comparative Study on Feature Selection and Classification Methods Using Gene Expression Proteomics and Proteomic Patterns, " Genome Informatics No. 13, pp 51-06, 2002.
-
(2002)
Genome Informatics
, Issue.13
, pp. 51-06
-
-
Liu, H.1
Li, J.2
Wong, L.3
-
9
-
-
84904888755
-
Attacking DDoS at the Source
-
Paris, France, November
-
J. Mirkovic, G. Prier, P. Reiher, "Attacking DDoS at the Source, " In Proc. of ICNP 2002, pp 312-321, Paris, France, November 2002.
-
(2002)
Proc. of ICNP 2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
10
-
-
72849120951
-
Source-End DDoS Defense
-
April 2003, Cambridge, Massachusette
-
J. Mirkovic, G. Prier, P. Reiher, "Source-End DDoS Defense, " In Proc. of NCA 2003, pp 171-178, April 2003, Cambridge, Massachusette
-
In Proc. of NCA 2003
, pp. 171-178
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
11
-
-
85133014878
-
Detection of Denial-of-QoS Attacks Based on x2 Statistic and EWMA Control Charts
-
January
-
V. A. Mahadik, X. Wu, D. S. Reeves, "Detection of Denial-of-QoS Attacks Based on x2 Statistic and EWMA Control Charts, " USENIX Secu-rity502, January 2002.
-
(2002)
USENIX Secu-rity502
-
-
Mahadik, V. A.1
Wu, X.2
Reeves, D. S.3
-
12
-
-
0142071646
-
Inte-, grated Access Control and Intrusion Detection for Web Servers
-
September
-
T. Ryutov, C. Neuman, D. Kim, L. Zhou, "Inte-, grated Access Control and Intrusion Detection for Web Servers, " IEEE Transactions on Parallel and Distributed Systems, Vol. 14, No. 9, pp 841-850, September 2003.
-
(2003)
IEEE Transactions on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 841-850
-
-
Ryutov, T.1
Neuman, C.2
Kim, D.3
Zhou, L.4
-
14
-
-
0002341107
-
Mutual Information in Learning Feature Transformations
-
Stanford, CA, June 29-July 2
-
K. Torkkola, W. Campbell, "Mutual Information in Learning Feature Transformations, " In Proc. of ICML 2000, Stanford, CA, pp 1015-1022 June 29-July 2, 2000.
-
(2000)
Proc. of ICML 2000
, pp. 1015-1022
-
-
Torkkola, K.1
Campbell, W.2
-
15
-
-
84942318236
-
Security for Grid Services
-
Seattle, Washington
-
V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Cajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, and S. Tuecke, "Security for Grid Services, " In Proc. 12th IEEE International Symposium on High Performance Distributed Computing, pp 48-57, Seattle, Washington, 2003.
-
(2003)
Proc. 12th IEEE International Symposium on High Performance Distributed Computing
, pp. 48-57
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Cajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
-
16
-
-
85133028778
-
-
Tech. Report, Department of Computer Science, Texas A&M University, USA
-
J. Wu, D. Cheng, W. Zhao, "Detecting Grid-Abuse Attacks by Source-based Monitoring, " Tech. Report, Department of Computer Science, Texas A&M University, USA, 2002.
-
(2002)
Detecting Grid-Abuse Attacks by Source-based Monitoring
-
-
Wu, J.1
Cheng, D.2
Zhao, W.3
-
17
-
-
0036864028
-
EWMA Techniques for Computer Intrusion Detection through Anomalous Changes in Event Intensity
-
N. Ye, C. Borror, and Y. Zhang, "EWMA Techniques for Computer Intrusion Detection through Anomalous Changes in Event Intensity, " Quality and Reliability Engineering International, Vol. 18, No. 6, pp 443-451, 2002.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.6
, pp. 443-451
-
-
Ye, N.1
Borror, C.2
Zhang, Y.3
-
18
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
July
-
N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate statistical analysis of audit trails for host-based intrusion detection, " IEEE Transactions on Computers, Vol. 51. No. 7, pp 810-820, July 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S. M.2
Chen, Q.3
Vilbert, S.4
|