-
1
-
-
33845516367
-
Intrusion detection techniques
-
H. Bidgoli, ed., Wiley & Sons
-
P. Ning and S. Jajodia, "Intrusion Detection Techniques," The Internet Encyclopedia, H. Bidgoli, ed., Wiley & Sons, 2003, pp. 2-6.
-
(2003)
The Internet Encyclopedia
, pp. 2-6
-
-
Ning, P.1
Jajodia, S.2
-
2
-
-
0003914522
-
-
tech. report CMU/SEI-99-TR-028, Carnegie Mellon Univ. Software Eng. Inst.
-
J. Allen et al., State of the Practice of Intrusion Detection Technologies, tech. report CMU/SEI-99-TR-028, Carnegie Mellon Univ. Software Eng. Inst., 2000, pp. 37-60; www.sei.cmu.edu/pub/documents/99.reports/pdf/ 99tr028.pdf.
-
(2000)
State of the Practice of Intrusion Detection Technologies
, pp. 37-60
-
-
Allen, J.1
-
4
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Usenix Assoc.
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. 7th Ann. Usenix Security Symp. (Security 98), Usenix Assoc., 1998, pp. 12-15.
-
(1998)
Proc. 7th Ann. Usenix Security Symp. (Security 98)
, pp. 12-15
-
-
Paxson, V.1
-
6
-
-
85139020324
-
The work of intrusion detection: Rethinking the role of security analysts
-
Nicolas C. Romano, ed., Assoc. for Information Systems
-
J. Goodall, W. Lutters, and A. Komlodi, 'The Work of Intrusion Detection: Rethinking the Role of Security Analysts," Proc. 10th Americas Conf. Information Systems (AMCIS 04), Nicolas C. Romano, ed., Assoc. for Information Systems, 2004, pp. 1421-1427.
-
(2004)
Proc. 10th Americas Conf. Information Systems (AMCIS 04)
, pp. 1421-1427
-
-
Goodall, J.1
Lutters, W.2
Komlodi, A.3
-
7
-
-
0004145058
-
-
Secure Networks, Jan.
-
T. Ptacek and T. Newsham, Insertion, Evasion, and Denial-of-Service: Eluding Network Intrusion Detection, Secure Networks, Jan. 1998, pp. 11-14.
-
(1998)
Insertion, Evasion, and Denial-of-Service: Eluding Network Intrusion Detection
, pp. 11-14
-
-
Ptacek, T.1
Newsham, T.2
-
8
-
-
84903593793
-
An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
-
IEEE CS Press
-
D. Mute, G. Vigna, and R. Kemmerer, "An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems," Proc. 19th Ann. Computer Security Applications Conf. (ACSAC 03), IEEE CS Press, 2003, pp. 2-7.
-
(2003)
Proc. 19th Ann. Computer Security Applications Conf. (ACSAC 03)
, pp. 2-7
-
-
Mute, D.1
Vigna, G.2
Kemmerer, R.3
-
9
-
-
4544230873
-
Hiding intrusions: From the abnormal to the normal and beyond
-
LNCS 2578, Springer-Verlag
-
K. Tan, J. McHugh, and K. Killourhy, "Hiding Intrusions: From the Abnormal to the Normal and Beyond," Proc. 5th Int'l Workshop on Information Hiding, LNCS 2578, Springer-Verlag, 2002, pp. 10-16.
-
(2002)
Proc. 5th Int'l Workshop on Information Hiding
, pp. 10-16
-
-
Tan, K.1
Mchugh, J.2
Killourhy, K.3
-
14
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
Aug.
-
T. Detristan et al., "Polymorphic Shellcode Engine Using Spectrum Analysis," Phrack, vol. 11, no. 61, Aug. 2003; www.trust-us.ch/phrack/show. php.
-
(2003)
Phrack
, vol.11
, Issue.61
-
-
Detristan, T.1
-
16
-
-
84860044547
-
History and advances in windows shell code
-
July
-
S.K. Chong, "History and Advances in Windows Shell code," Phrack, vol. 11, no. 62, July 2004; www.trust-us.ch/phrack/show.php.
-
(2004)
Phrack
, vol.11
, Issue.62
-
-
Chong, S.K.1
|