-
1
-
-
0003555938
-
Context-free grammars and pushdown storage
-
Massachusetts Institute of Technology Research Laboratory of Electronics, April
-
N. Chomsky. Context-free grammars and pushdown storage. In Quarterly Progress Report No. 65, pages 187-194. Massachusetts Institute of Technology Research Laboratory of Electronics, April 1962.
-
(1962)
Quarterly Progress Report No. 65
, vol.65
, pp. 187-194
-
-
Chomsky, N.1
-
2
-
-
70349100099
-
Anomaly detection using call stack information
-
Oakland, California, May
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information, In IEEE Symposium on Security and Privacy, Oakland, California, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
3
-
-
0029716418
-
A sense of self for Unix processes
-
Los Alamitos, California, May
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In IEEE Symposium on Security and Privacy, pages 120-128, Los Alamitos, California, May 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
5
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Santa Clara, California, April
-
A. Ghosh, A. Schwartzbard, and M. Schatz. Learning program behavior profiles for intrusion detection. In 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999.
-
(1999)
1st USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Ghosh, A.1
Schwartzbard, A.2
Schatz, M.3
-
6
-
-
85084162795
-
Detecting manipulated remote call streams
-
San Francisco, California, August
-
J. Giffin, S. Jha, and B. Miller. Detecting manipulated remote call streams. In 11th USENIX Security Symposium, San Francisco, California, August 2002.
-
(2002)
11th USENIX Security Symposium
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
7
-
-
33846312311
-
Efficient context-sensitive intrusion detection
-
San Diego, California, February
-
J. Giffin, S. Jha, and B. Miller. Efficient context-sensitive intrusion detection. In 11th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego, California, February 2004.
-
(2004)
11th Annual Network and Distributed Systems Security Symposium (NDSS)
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
8
-
-
0032313923
-
Intrusion detection system using sequences of system calls
-
S. Hofmeyr, A. Somayaji, and S. Forrest. Intrusion detection system using sequences of system calls. Journal of Computer Security, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.1
Somayaji, A.2
Forrest, S.3
-
9
-
-
0003620778
-
-
Addison-Wesley, 2nd edition
-
J. Hopcroft, R. Motwani, and J. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2nd edition, 2001.
-
(2001)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
10
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. Kemmerer, and P. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
11
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
Orlando, Florida, December
-
C. Ko, G. Fink, and K. Levitt. Automated detection of vulnerabilities in privileged programs by execution monitoring. In 10th Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, December 1994.
-
(1994)
10th Annual Computer Security Applications Conference (ACSAC)
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
12
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
August
-
T. Lane and C. Brodley. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security, 2(3):295-331, August 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.2
-
14
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
Oakland, California, May
-
W. Lee, S. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, Oakland, California, May 1999.
-
(1999)
IEEE Symposium on Security and Privacy
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
15
-
-
0003111439
-
Automated audit trail analysis and intrusion detection: A survey
-
Baltimore, Maryland, October
-
T. Lunt. Automated audit trail analysis and intrusion detection: A survey, In 11th National Computer Security Conference (NCSC), Baltimore, Maryland, October 1988.
-
(1988)
11th National Computer Security Conference (NCSC)
-
-
Lunt, T.1
-
16
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24), December 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
-
-
Paxson, V.1
-
17
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks Inc., January
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc., January 1998. http://www.aciri.org/vem/Ptacek-Newsham-Evasion-98.ps.
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
18
-
-
3042546934
-
-
Ph.D. dissertation, Technische Universität München, June
-
S. Schwoon. Model-Checking Pushdown Systems. Ph.D. dissertation, Technische Universität München, June 2002.
-
(2002)
Model-checking Pushdown Systems
-
-
Schwoon, S.1
-
19
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Oakland, California, May
-
R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati. A fast automaton-based method for detecting anomalous program behaviors. In IEEE Symposium on Security and Privacy, Oakland, California, May 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Sekar, R.1
Bendre, M.2
Bollineni, P.3
Dhurjati, D.4
-
20
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Zurich, Switzerland, October. Springer-Verlag
-
K. Tan, K. Killourhy, and R. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. In Recent Advances in Intrusion Detection (RAID) 2002, LNCS #2516, pages 54-73, Zurich, Switzerland, October 2002. Springer-Verlag.
-
(2002)
Recent Advances in Intrusion Detection (RAID) 2002, LNCS #2516
, vol.2516
, pp. 54-73
-
-
Tan, K.1
Killourhy, K.2
Maxion, R.3
-
21
-
-
35248821244
-
Hiding intrusions: From the abnormal to the normal and beyond
-
Noordwijkerhout, Netherlands, October. Springer-Verlag
-
K. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In 5th International Workshop on Information Hiding, LNCS #2578, Noordwijkerhout, Netherlands, October 2002. Springer-Verlag.
-
(2002)
5th International Workshop on Information Hiding, LNCS #2578
, vol.2578
-
-
Tan, K.1
McHugh, J.2
Killourhy, K.3
-
22
-
-
0024984441
-
Adaptive real-time anomaly detection using inductively generated sequential patterns
-
Oakland, California, May
-
H. Teng, K. Chen, and S.-Y. Lu. Adaptive real-time anomaly detection using inductively generated sequential patterns. In IEEE Symposium on Security and Privacy, Oakland, California, May 1990.
-
(1990)
IEEE Symposium on Security and Privacy
-
-
Teng, H.1
Chen, K.2
Lu, S.-Y.3
-
26
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, California, May
-
C. Warrander, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: Alternative data models. In IEEE Symposium on Security and Privacy, Oakland, California, May 1999.
-
(1999)
IEEE Symposium on Security and Privacy
-
-
Warrander, C.1
Forrest, S.2
Pearlmutter, B.3
-
27
-
-
84944248021
-
Intrusion detection using variable-length audit trail patterns
-
Toulouse, France, October. Springer-Verlag
-
A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable-length audit trail patterns. In Recent Advances in Intrusion Detection (RAID) 2000, LNCS #1907, pages 110-129, Toulouse, France, October 2000. Springer-Verlag.
-
(2000)
Recent Advances in Intrusion Detection (RAID) 2000, LNCS #1907
, vol.1907
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
|