-
2
-
-
0003545819
-
-
Tech. Report CSD-TR-823, Department of Computer Science, Purdue University
-
Eugene H. Spafford, The Internet worm program: an analysis, Tech. Report CSD-TR-823, Department of Computer Science, Purdue University, 1988.
-
(1988)
The Internet Worm Program: An Analysis
-
-
Spafford, E.H.1
-
4
-
-
0003451777
-
-
Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February
-
T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes, T. Garvey, A real-time intrusion detection expert system (IDES) - final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February 1992.
-
(1992)
A Real-time Intrusion Detection Expert System (IDES) - Final Technical Report
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.5
Javitz, H.6
Valdes, A.7
Garvey, T.8
-
5
-
-
0024984013
-
A Network Security Monitor
-
T. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, D. Wobler, A Network Security Monitor , Proceedings IEEE Symposium on Research in Computer Security and Privacy, 1990.
-
(1990)
Proceedings IEEE Symposium on Research in Computer Security and Privacy
-
-
Heberlein, T.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wobler, D.6
-
8
-
-
21644432294
-
-
IBM T.J. Watson Research Center, IEEE Spectrum, May
-
J.O. Kephart, David M. Chess, S.R. White, Computers and Epidemiology, IBM T.J. Watson Research Center, IEEE Spectrum, May 1993.
-
(1993)
Computers and Epidemiology
-
-
Kephart, J.O.1
Chess, D.M.2
White, S.R.3
-
9
-
-
32644443064
-
-
Technical report, IBM T.J. Watson Research Center, Yorktown Heights, New York
-
J.O. Kephait, G.B. Sorkia, M. Swimmer, S.R. White, Blueprint for a Computer Immune System. Technical report, IBM T.J. Watson Research Center, Yorktown Heights, New York, 1997.
-
(1997)
Blueprint for a Computer Immune System
-
-
Kephait, J.O.1
Sorkia, G.B.2
Swimmer, M.3
White, S.R.4
-
10
-
-
24444463215
-
-
Department of Computer Science, University of Virginia, ACSAC
-
Chenxi Wang, John C. Knight, Matthew C. Elder, On Computer Viral Infection and the Effect of Immunization, Department of Computer Science, University of Virginia, ACSAC 2000.
-
(2000)
On Computer Viral Infection and the Effect of Immunization
-
-
Wang, C.1
Knight, J.C.2
Elder, M.C.3
-
13
-
-
0003964874
-
-
SRI-CSL-95-07, SRI International
-
D. Anderson, T. Lunt, H. Javitz, A. Tamaru, and A. Valdes, Next-generation Intrusion Detection Expert System (NIDES): A Summary, SRI-CSL-95-07, SRI International, 1995.
-
(1995)
Next-generation Intrusion Detection Expert System (NIDES): A Summary
-
-
Anderson, D.1
Lunt, T.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
15
-
-
84964528811
-
Cyber Ecology: Looking to Ecology for Insights into Information Assurance
-
Jane Jorgensen, P. Rossignol, M. Takikawa, D. Upper, Cyber Ecology: Looking to Ecology for Insights into Information Assurance, DISCEX 2001. Proceedings, Volume 2, 2001.
-
(2001)
DISCEX 2001. Proceedings
, vol.2
-
-
Jorgensen, J.1
Rossignol, P.2
Takikawa, M.3
Upper, D.4
-
16
-
-
0242456143
-
NATE, Network Analysis of Anomalous Traffic Events, a Low-cost Approach
-
Carol Taylor, Jim Alves-Foss, NATE, Network Analysis of Anomalous Traffic Events, A Low-cost Approach, New Security Paradigms Workshop, 2001.
-
(2001)
New Security Paradigms Workshop
-
-
Taylor, C.1
Alves-Foss, J.2
-
17
-
-
0242624600
-
MET: An Experimental System for Malicious Email Tracking
-
NSPW-2002
-
Manasi Bhattacharyya, Shlomo Hershkop, Eleazar Eskin, and Salvatore J. Stolfo, MET: An Experimental System for Malicious Email Tracking, Workshop on New Security Paradigms, 2002 (NSPW-2002).
-
(2002)
Workshop on New Security Paradigms
-
-
Bhattacharyya, M.1
Hershkop, S.2
Eskin, E.3
Stolfo, S.J.4
-
22
-
-
3543071263
-
-
IBM TJ Watson Research Center, Sept
-
Ian Whalley, Bill Arnold, David Chess, John Morar, Alia Segal, Morton Swimmer, An Environment for Controlled Worm Replication and Analysis, IBM TJ Watson Research Center, Sept 2000.
-
(2000)
An Environment for Controlled Worm Replication and Analysis
-
-
Whalley, I.1
Arnold, B.2
Chess, D.3
Morar, J.4
Segal, A.5
Swimmer, M.6
-
24
-
-
0027593257
-
NADIR: An Automated System for Detecting Network Intrusion and Misuse
-
May
-
J. Hochberg et al, NADIR: An Automated System for Detecting Network Intrusion and Misuse, Computers and Security 12(3), May 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.3
-
-
Hochberg, J.1
-
26
-
-
85084164413
-
Bro: A System for Detecting Network Intruders in Real-Time
-
V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time, USENIX Security Symposium, 1998.
-
(1998)
USENIX Security Symposium
-
-
Paxson, V.1
-
28
-
-
4243209221
-
-
Inc. Network Flight Recorder
-
Inc. Network Flight Recorder. Network flight recorder, http://www.nfr.com, 1997.
-
(1997)
Network Flight Recorder
-
-
-
35
-
-
10244223943
-
Behavior Profiling of Email
-
submitted to
-
Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskem, Chia-Wei Hu, Behavior Profiling of Email, submitted to 1st NSF/NIJ Symposium on Intelligence and Security Informatics(ISI 2003).
-
1st NSF/NIJ Symposium on Intelligence and Security Informatics(ISI 2003)
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskem, O.4
Hu, C.-W.5
-
36
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based anomaly detection: a new approach for detecting network intrusions, ACM Computer and Communication Security Conference, 2002.
-
(2002)
ACM Computer and Communication Security Conference
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
37
-
-
0033280865
-
A High-Performance, Network Intrusion Detection System
-
R. Sekar, Y. Guang, T. Shanbhag and S. Verma, A High-Performance, Network Intrusion Detection System, ACM Computer and Communication Security Conference, 1999.
-
(1999)
ACM Computer and Communication Security Conference
-
-
Sekar, R.1
Guang, Y.2
Shanbhag, T.3
Verma, S.4
-
38
-
-
85084163313
-
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
-
R. Sekar and P. Uppuluri, Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications, USENIX Security Symposium, 1999.
-
(1999)
USENIX Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
|