-
2
-
-
84880858814
-
"Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector
-
Oakland, CA
-
Tan, K. M. C., Maxion, R. A.: "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA (2002)
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
3
-
-
0029716418
-
A sense of self for unix processes
-
Los Alamitos, CA, IEEE Computer Society Press
-
Forrest, S., Hofmeyr, S. A., Somayaji, A., Longstaff, T. A.: A sense of self for unix processes. In: Proceedings 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, IEEE Computer Society Press (1996)
-
(1996)
Proceedings 1996 IEEE Symposium on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
4
-
-
35248866023
-
-
On line report of work performed at the University of Michigan Center for Information Technology Integration Observed at as of 4 february 2002
-
Provos, N.: Steganography press information. On line report of work performed at the University of Michigan Center for Information Technology Integration (2002) Observed at http://www.citi.umich.edu/projects/steganography/ faq.html as of 4 february 2002
-
(2002)
Steganography Press Information
-
-
Provos, N.1
-
5
-
-
0038075565
-
Detecting steganographic content on the internet
-
San Diego, CA
-
Provos, N., Honeyman, P.: Detecting steganographic content on the internet. In: ISOC NDSS'02, San Diego, CA (2002)
-
(2002)
ISOC NDSS'02
-
-
Provos, N.1
Honeyman, P.2
-
6
-
-
0004048154
-
-
Technical report, James P. Anderson Co., Fort Washington, PA
-
Anderson, J. P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA (1980) Available online at http://seclab.cs.ucdavis.edu/projects/history/CD/ande80.pdf
-
(1980)
Computer Security Threat Monitoring and Surveillance
-
-
Anderson, J.P.1
-
7
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, CA
-
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: Alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA (1999) 133-145
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
11
-
-
35248852721
-
-
Included in tmpwatch version 2.2 software package
-
Troan, E., Brows, P.: Tmpwatch(8). Included in tmpwatch version 2.2 software package (2000)
-
(2000)
Tmpwatch(8)
-
-
Troan, E.1
Brows, P.2
-
13
-
-
35248833477
-
-
Included in traceroute version 1.4a5 software package
-
Jaconson, V.: Traceroute(8). Included in traceroute version 1.4a5 software package (1997)
-
(1997)
Traceroute(8)
-
-
Jaconson, V.1
-
17
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Wespi, A., Vigna, G., Deri, L., eds.: 5th International Symposium, RAID 2002. Number 2516 Zurich, Switzerland, Springer
-
Tan, K. M., Killourhy, K. S., Maxion, R. A.: Undermining an anomaly-based intrusion detection system using common exploits. In Wespi, A., Vigna, G., Deri, L., eds.: 5th International Symposium, RAID 2002. Number 2516 in LNCS, Zurich, Switzerland, Springer (2002) 54-73
-
(2002)
LNCS
, pp. 54-73
-
-
Tan, K.M.1
Killourhy, K.S.2
Maxion, R.A.3
-
18
-
-
0034836392
-
Information-theoretic measures for anomaly detection'
-
Oakland, CA, IEEE Computer Society Press, Los Alamitos, CA
-
Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection'. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press, Los Alamitos, CA (2001) 130-143
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
|