-
1
-
-
0003964874
-
Next-generation intrusion detection expert system
-
Computer Science Laboratory, SRI International, Menlo Park, CA, May
-
D. Anderson, T. Privold, and A. Valdes. Next-generation intrusion detection expert system. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA, May 1995.
-
(1995)
Technical Report SRI-CSL-95-07
-
-
Anderson, D.1
Privold, T.2
Valdes, A.3
-
2
-
-
0003516333
-
Intrusion detection systems: A taxonomy and survey
-
Dept. of Computer Engineering, Chalmers University of Technology, Sweden
-
S. Axelsson. Intrusion detection systems: A taxonomy and survey. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, 2000.
-
(2000)
Technical Report 99-15
-
-
Axelsson, S.1
-
3
-
-
12444302290
-
Program monitoring with Itl in eagle
-
Santa Fe, New Mexico, USA, April To Appear.
-
H. Barringer, A. Goldberg, K. Havelund, and K. Sen. Program monitoring with Itl in eagle. In Workshop on Parallel and Distributed Systems: Testing and Debugging (PADTAD'04) (Satellite workshop of IPDPS'04), Santa Fe, New Mexico, USA, April 2004. (To Appear).
-
(2004)
Workshop on Parallel and Distributed Systems: Testing and Debugging (PADTAD'04) (Satellite Workshop of IPDPS'04)
-
-
Barringer, H.1
Goldberg, A.2
Havelund, K.3
Sen, K.4
-
4
-
-
84944202148
-
Rule-based runtime verification
-
Proceedings of 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04), Venice, Italy, January Springer-Verlag
-
H. Barringer, A. Goldberg, K. Havelund, and K. Sen. Rule-based runtime verification. In Proceedings of 5th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'04), Volume 2937 of Lecture Notes in Computer Science, pages 44-57, Venice, Italy, January 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.2937
, pp. 44-57
-
-
Barringer, H.1
Goldberg, A.2
Havelund, K.3
Sen, K.4
-
7
-
-
0033293396
-
Towards a taxonomy of intrusion detection systems
-
April
-
H. Debar, M. Dacier, and A. Wespi. Towards a taxonomy of intrusion detection systems. Computer Networks, 31(8):805-822, April 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
8
-
-
19144362424
-
Monitoring Java Programs with Java PathExplorer
-
Proceedings of Runtime Verification (RV'Ol), Elsevier
-
K. Havelund and G. ROS.U. Monitoring Java Programs with Java PathExplorer. In Proceedings of Runtime Verification (RV'Ol), Volume 55 of ENTCS. Elsevier, 2001.
-
(2001)
ENTCS
, vol.55
-
-
Havelund, K.1
Rosu, G.2
-
10
-
-
0029267472
-
State transition analysis: A rulebased intrusion detection approach
-
K. Ilgun, R. Kemmerer, and P. Porras. State transition analysis: A rulebased intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
11
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
May
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In IEEE Symposium on Security and Privacy, pages 175-187, May 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
14
-
-
0032676506
-
A datamining framework for building intrusion detection models
-
May
-
W. Lee. A datamining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, pages 120-132, May 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
-
17
-
-
2942645420
-
Expert systems in intrusion detection: A case study
-
M. Sebring, E. Shellhouse, M. Hanna, and R. Whitehurst. Expert systems in intrusion detection: A case study. In National Computer Security Conference, pages 74-81, 1998.
-
(1998)
National Computer Security Conference
, pp. 74-81
-
-
Sebring, M.1
Shellhouse, E.2
Hanna, M.3
Whitehurst, R.4
-
18
-
-
38549146204
-
Runtime Safety Analysis of Multithreaded Programs
-
Helsinki, Finland, September ACM
-
K. Sen, G. Roşu, and G. Agha. Runtime Safety Analysis of Multithreaded Programs. In 9th European Software Engineering Conference, and 11th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (ESEC/FSE'03), pages 337-346, Helsinki, Finland, September 2003. ACM.
-
(2003)
9th European Software Engineering Conference, and 11th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (ESEC/FSE'03)
, pp. 337-346
-
-
Sen, K.1
Roşu, G.2
Agha, G.3
-
19
-
-
33749420474
-
Online efficient predictive safety analysis of multithreaded programs
-
Proceedings of 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), Barcelona, Spain, March
-
K. Sen, G. ROS.U, and G. Agha. Online efficient predictive safety analysis of multithreaded programs. In Proceedings of 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), Volume 2988 of LNCS, pages 123-138, Barcelona, Spain, March 2004.
-
(2004)
LNCS
, vol.2988
, pp. 123-138
-
-
Sen, K.1
Rosu, G.2
Agha, G.3
-
20
-
-
4644288597
-
Efficient decentralized monitoring of safety in distributed systems
-
Edinburgh, UK, May IEEE
-
K. Sen, A. Vardhan, G. Agha, , and G. Roşu. Efficient decentralized monitoring of safety in distributed systems. In Proceedings of 26th International Conference on Software Engineering (ICSE'04), pages 418-427, Edinburgh, UK, May 2004. IEEE.
-
(2004)
Proceedings of 26th International Conference on Software Engineering (ICSE'04)
, pp. 418-427
-
-
Sen, K.1
Vardhan, A.2
Agha, G.3
Roşu, G.4
-
21
-
-
0025548907
-
Security audit trail analysis using inductively generated predictive rules
-
IEEE Computer Society Press, March
-
H. Teng, K. Chen, and S. Lu. Security audit trail analysis using inductively generated predictive rules. In Conference on Artificial Intelligence Applications, pages 24-29. IEEE Computer Society Press, March 1990.
-
(1990)
Conference on Artificial Intelligence Applications
, pp. 24-29
-
-
Teng, H.1
Chen, K.2
Lu, S.3
|