메뉴 건너뛰기




Volumn 2578, Issue , 2003, Pages 1-17

Hiding intrusions: From the abnormal to the normal and beyond

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 35248821244     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36415-3_1     Document Type: Article
Times cited : (24)

References (18)
  • 4
    • 35248866023 scopus 로고    scopus 로고
    • On line report of work performed at the University of Michigan Center for Information Technology Integration Observed at as of 4 february 2002
    • Provos, N.: Steganography press information. On line report of work performed at the University of Michigan Center for Information Technology Integration (2002) Observed at http://www.citi.umich.edu/projects/steganography/ faq.html as of 4 february 2002
    • (2002) Steganography Press Information
    • Provos, N.1
  • 5
    • 0038075565 scopus 로고    scopus 로고
    • Detecting steganographic content on the internet
    • San Diego, CA
    • Provos, N., Honeyman, P.: Detecting steganographic content on the internet. In: ISOC NDSS'02, San Diego, CA (2002)
    • (2002) ISOC NDSS'02
    • Provos, N.1    Honeyman, P.2
  • 6
    • 0004048154 scopus 로고
    • Technical report, James P. Anderson Co., Fort Washington, PA
    • Anderson, J. P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA (1980) Available online at http://seclab.cs.ucdavis.edu/projects/history/CD/ande80.pdf
    • (1980) Computer Security Threat Monitoring and Surveillance
    • Anderson, J.P.1
  • 11
    • 35248852721 scopus 로고    scopus 로고
    • Included in tmpwatch version 2.2 software package
    • Troan, E., Brows, P.: Tmpwatch(8). Included in tmpwatch version 2.2 software package (2000)
    • (2000) Tmpwatch(8)
    • Troan, E.1    Brows, P.2
  • 13
    • 35248833477 scopus 로고    scopus 로고
    • Included in traceroute version 1.4a5 software package
    • Jaconson, V.: Traceroute(8). Included in traceroute version 1.4a5 software package (1997)
    • (1997) Traceroute(8)
    • Jaconson, V.1
  • 17
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • Wespi, A., Vigna, G., Deri, L., eds.: 5th International Symposium, RAID 2002. Number 2516 Zurich, Switzerland, Springer
    • Tan, K. M., Killourhy, K. S., Maxion, R. A.: Undermining an anomaly-based intrusion detection system using common exploits. In Wespi, A., Vigna, G., Deri, L., eds.: 5th International Symposium, RAID 2002. Number 2516 in LNCS, Zurich, Switzerland, Springer (2002) 54-73
    • (2002) LNCS , pp. 54-73
    • Tan, K.M.1    Killourhy, K.S.2    Maxion, R.A.3
  • 18
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection'
    • Oakland, CA, IEEE Computer Society Press, Los Alamitos, CA
    • Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection'. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press, Los Alamitos, CA (2001) 130-143
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.