-
1
-
-
0003964874
-
Next-Generation Intrusion Detection Expert System (NIDES): A Summary
-
Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, May
-
D. Anderson, T. Frivold, and A. Valdes. Next-Generation Intrusion Detection Expert System (NIDES): A Summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, May 1995.
-
(1995)
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
2
-
-
33747043555
-
-
Apache Software Foundation
-
Apache Software Foundation. SpamAssassin, 2005. http://spamassassin. apache.org.
-
(2005)
SpamAssassin
-
-
-
3
-
-
78650165017
-
User Authentication through Keystroke Dynamics
-
F. Bergadano, D. Gunetti, and C. Picardi. User Authentication through Keystroke Dynamics. ACM Trans. Inf. Syst. Secur., 5(4):367-397, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.4
, pp. 367-397
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
4
-
-
1642409662
-
DEMIDS: Misuse Detection System Database System
-
C. Chung, M. Gertz, and K. Levitt. DEMIDS: Misuse Detection System Database System. In IICIS, 1999.
-
(1999)
IICIS
-
-
Chung, C.1
Gertz, M.2
Levitt, K.3
-
5
-
-
85084160243
-
Stack-Guard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
Jan
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Stack-Guard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proc. 7th USENIX Security Conference, Jan 1998.
-
(1998)
Proc. 7th USENIX Security Conference
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
7
-
-
33846287038
-
-
M. Delany. Internet draft: Domain-based email authentication using public-keys advertised in the DNS (DomainKeys), March 2005. http://www.ietf.org/ internetdrafts/draft-delany-domainkeys-base-02.txt.
-
M. Delany. Internet draft: Domain-based email authentication using public-keys advertised in the DNS (DomainKeys), March 2005. http://www.ietf.org/ internetdrafts/draft-delany-domainkeys-base-02.txt.
-
-
-
-
8
-
-
0012297627
-
Computer Intrusion Detection Based on Bayes Factors for Comparing Command Transition Probabilities
-
Technical report, National Institute of Statistical Sciences NISS
-
W. DuMouchel. Computer Intrusion Detection Based on Bayes Factors for Comparing Command Transition Probabilities. Technical report, National Institute of Statistical Sciences (NISS), 1999.
-
(1999)
-
-
DuMouchel, W.1
-
9
-
-
0024984013
-
A Network Security Monitor
-
L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber. A Network Security Monitor. In Proceedings of the IEEE Symposium on Security and Privacy, 1990.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Heberlein, L.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
12
-
-
33846266028
-
Request for Comment (RFC) 2821: Simple Mail Transfer Protocol
-
April
-
J. Klensin. Request for Comment (RFC) 2821: Simple Mail Transfer Protocol, April 2001.
-
(2001)
-
-
Klensin, J.1
-
16
-
-
33846318730
-
Request for Comment (RFC) 1939: Post Office Protocol-Version 3
-
May
-
J. Myers and M. Rose. Request for Comment (RFC) 1939: Post Office Protocol-Version 3, May 1996.
-
(1996)
-
-
Myers, J.1
Rose, M.2
-
17
-
-
35048851006
-
Anomaly Detection Using Layered Networks Based on Eigen Cooccurrence Matrix
-
RAID 2004 Proceedings, of, Springer-Verlag
-
M. Oka, Y. Oyama, H. Abe, and K. Kato. Anomaly Detection Using Layered Networks Based on Eigen Cooccurrence Matrix. In RAID 2004 Proceedings, volume 3224 of LNCS, pages 223-237. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3224
, pp. 223-237
-
-
Oka, M.1
Oyama, Y.2
Abe, H.3
Kato, K.4
-
18
-
-
1842643238
-
Request for Comment (RFC) 2633: S/MIME Version 3 Message Specification
-
June
-
B. Ramsdell. Request for Comment (RFC) 2633: S/MIME Version 3 Message Specification, June 1999.
-
(1999)
-
-
Ramsdell, B.1
-
20
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
M. Schonlau, W. DuMouchel, W. Ju, A. Karr, M. Theus, and Y. Vardi. Computer intrusion: Detecting masquerades. Statistical Science, 16(1):1-17, 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 1-17
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.3
Karr, A.4
Theus, M.5
Vardi, Y.6
-
23
-
-
33846306906
-
-
The Spamhaus Project
-
The Spamhaus Project, http://www.spamhaus.org, 2005.
-
(2005)
-
-
-
24
-
-
33846287403
-
-
University of Washington
-
University of Washington. IMAP information center. http://www.washington. edu/imap/, 2005.
-
(2005)
IMAP information center
-
-
-
25
-
-
35048885009
-
Anomalous Payload-based Network Intrusion Detection
-
RAID 2004 Proceedings, of, Springer-Verlag
-
K. Wang and S. J. Stolfo. Anomalous Payload-based Network Intrusion Detection. In RAID 2004 Proceedings, volume 3224 of LNCS, pages 203-222. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
26
-
-
33846309063
-
-
M. Wong and W. Schlitt. Internet draft: Sender policy framework (SPF) for authorizing use of domains in email, version 1, June 6 2005. http://www.ietf.org/internetdrafts/draft-schlitt-spf-classic-02.txt.
-
M. Wong and W. Schlitt. Internet draft: Sender policy framework (SPF) for authorizing use of domains in email, version 1, June 6 2005. http://www.ietf.org/internetdrafts/draft-schlitt-spf-classic-02.txt.
-
-
-
|