-
1
-
-
33845964140
-
-
Cyber Security: A Crisis of Prioritization, February 2005. A Technical Report by President's Information Technology Advisory Committee (PITAC).
-
"Cyber Security: A Crisis of Prioritization," February 2005. A Technical Report by President's Information Technology Advisory Committee (PITAC).
-
-
-
-
4
-
-
0003893616
-
Requirements and Model for IDES - A Real-time Intrusion Detection System
-
Computer Science Laboratory, SRI International, Menlo Park, CA
-
D. E. Denning and P. G. Neumann, "Requirements and Model for IDES - A Real-time Intrusion Detection System," tech. rep., Computer Science Laboratory, SRI International, Menlo Park, CA, 1985.
-
(1985)
tech. rep
-
-
Denning, D.E.1
Neumann, P.G.2
-
5
-
-
0003027845
-
An Application of Machine Learning to Anomaly Detection
-
Gaithersburgh, MD, pp, The National Institute of Standards and Technology and the National Computer Security Center
-
T. Lane and C. E. Brodley, "An Application of Machine Learning to Anomaly Detection," in Proceedings of Twentieth National Information Systems Security Conference, vol. 1, (Gaithersburgh, MD), pp. 366-380, 1997. The National Institute of Standards and Technology and the National Computer Security Center.
-
(1997)
Proceedings of Twentieth National Information Systems Security Conference
, vol.1
, pp. 366-380
-
-
Lane, T.1
Brodley, C.E.2
-
8
-
-
0012282403
-
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, and M. T. andY. Vardi, Computer Intrusion: Detecting Masquerades, in Statistical Science, 16, pp. 58-74, 2001.
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, and M. T. andY. Vardi, "Computer Intrusion: Detecting Masquerades," in Statistical Science, vol. 16, pp. 58-74, 2001.
-
-
-
-
15
-
-
20444496997
-
User re-authentication via mouse movements
-
Washington DC, USA, pp
-
M. Pusara and C. E. Brodley, "User re-authentication via mouse movements," in VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, (Washington DC, USA), pp. 1-8, 2004.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 1-8
-
-
Pusara, M.1
Brodley, C.E.2
-
16
-
-
0032313923
-
Intrusion Detection Using Sequences of System Calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
17
-
-
0032676506
-
A Data Mining Framework for Building Intrusion Detection Models
-
W. Lee, S. Stolfo, and K. Mok, "A Data Mining Framework for Building Intrusion Detection Models," in IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
18
-
-
0031258214
-
Computer Immunology
-
S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer Immunology," Communications of the ACM, vol. 40, no. 10, pp. 88-96, 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
19
-
-
0032639421
-
Detecting Intrusions using System Calls: Alternative Data Models
-
Oakland, CA, pp
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting Intrusions using System Calls: Alternative Data Models," in IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 133-145, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
20
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection Approach
-
K. Ilgun, R. Kemmerer, and P. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach," Software Engineering, vol. 21, no. 3, pp. 181-199, 1995.
-
(1995)
Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
21
-
-
0036095845
-
-
Y. Li, N. Wu, S. Jajodia, and S. Wang, Enhancing Profiles for Anomaly Detection Using Time Granularities, Journal of Computer Security, 10, no. 1,2, pp. 137-157, 2002.
-
Y. Li, N. Wu, S. Jajodia, and S. Wang, "Enhancing Profiles for Anomaly Detection Using Time Granularities," Journal of Computer Security, vol. 10, no. 1,2, pp. 137-157, 2002.
-
-
-
-
22
-
-
0026154682
-
The SRI IDES Statistical Anomaly Detector
-
Oakland, CA, pp, MAY
-
H. S. Javitz and A. Valdes, "The SRI IDES Statistical Anomaly Detector," in Proceedings of the IEEE Research in Security and Privacy, (Oakland, CA), pp. 316-376, MAY 1991.
-
(1991)
Proceedings of the IEEE Research in Security and Privacy
, pp. 316-376
-
-
Javitz, H.S.1
Valdes, A.2
-
23
-
-
84944248021
-
Intrusion Detection Using Variable-Length Audit Trail Patterns
-
Springer-Verlag
-
A. Wespi, M. Dacier, and H. Debar, "Intrusion Detection Using Variable-Length Audit Trail Patterns," in Recent Advances in Intrusion Detection - Lecture Notes in Computer Science, vol. 1907, pp. 110-29, Springer-Verlag, 2000.
-
(2000)
Recent Advances in Intrusion Detection - Lecture Notes in Computer Science
, vol.1907
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
24
-
-
0003201842
-
A Markov Chain Model of Temporal Behavior for Anomaly Detection
-
N. Ye, "A Markov Chain Model of Temporal Behavior for Anomaly Detection," in Proceedings of the 2000 IEEE Sys terns, Man, and Cybernetics Information Assurance and Security Workshop, pp. 171-174, 2000.
-
(2000)
Proceedings of the 2000 IEEE Sys terns, Man, and Cybernetics Information Assurance and Security Workshop
, pp. 171-174
-
-
Ye, N.1
-
25
-
-
85042797742
-
Learning Program Behavior Profiles for Intrusion Detection
-
A. Ghosh, A. Schwartzbard, and M. Schatz, "Learning Program Behavior Profiles for Intrusion Detection," in First USENIX Workshop on Intrusion Detection and Network Monitoring, pp. 51-62, 1999.
-
(1999)
First USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 51-62
-
-
Ghosh, A.1
Schwartzbard, A.2
Schatz, M.3
-
26
-
-
0028714365
-
Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring
-
K. Levitt, G. Ko, and G. Fink, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring," in Computer Security Application Conference, 1994.
-
(1994)
Computer Security Application Conference
-
-
Levitt, K.1
Ko, G.2
Fink, G.3
-
27
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length N-grams
-
Ballycotton, County Cork, Ireland, pp
-
G. Marceau, "Characterizing the behavior of a program using multiple-length N-grams," in Proceedings of the 2000 workshop on New security paradigms, (Ballycotton, County Cork, Ireland), pp. 101-110, 2000.
-
(2000)
Proceedings of the 2000 workshop on New security paradigms
, pp. 101-110
-
-
Marceau, G.1
-
28
-
-
84944239503
-
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report
-
C. Michael and A. Ghosh, "Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report," Lecture Notes in Computer Science, vol. 1907, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1907
-
-
Michael, C.1
Ghosh, A.2
-
30
-
-
0036036095
-
Profile-directed Optimization of Event-based Programs
-
M. Rajagopalan, S. Debray, M. Hiltunen, and R. Schlichting, "Profile-directed Optimization of Event-based Programs," in Proceedings of ACM SIGPLAN 2002, pp. 106-116, 2002.
-
(2002)
Proceedings of ACM SIGPLAN 2002
, pp. 106-116
-
-
Rajagopalan, M.1
Debray, S.2
Hiltunen, M.3
Schlichting, R.4
-
31
-
-
70349100099
-
Anomaly Detection using Call Stack Information
-
Oakland, California, May
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong, "Anomaly Detection using Call Stack Information," in Proceedings of IEEE Symposium on Security and Privacy, (Oakland, California), May 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
32
-
-
84957069814
-
Text Categorization with Support Vector Machines: Learning with many relevant features
-
Springer Verlag, Heidelberg, DE
-
T. Joachims, "Text Categorization with Support Vector Machines: Learning with many relevant features," in Proceedings of ECML-98, 10th European Conference on Machine Learning, no. 1398, pp. 137-142, Springer Verlag, Heidelberg, DE, 1998.
-
(1998)
Proceedings of ECML-98, 10th European Conference on Machine Learning
, vol.1398
, pp. 137-142
-
-
Joachims, T.1
|