-
1
-
-
38349037768
-
-
United States v. Leandro Aragoncillo and Michael Ray Aquino: Criminal complaint. District of New Jersey (September 9, 2005)
-
United States v. Leandro Aragoncillo and Michael Ray Aquino: Criminal complaint. District of New Jersey (September 9, 2005)
-
-
-
-
2
-
-
27844543023
-
Insider threat study: Computer system sabotage in critical infrastructure sector
-
Technical report, US Secret Service and CERT Program, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA May
-
Keeney, M., et al.: Insider threat study: Computer system sabotage in critical infrastructure sector. Technical report, US Secret Service and CERT Program, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA (May 2005)
-
(2005)
-
-
Keeney, M.1
-
3
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3(4), 227-261 (2000)
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
4
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
National Institute of Standards and Technology, Gaithersburg, MD
-
Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 20th NIST-NCSC National Information Systems Security Conference, pp. 353-365. National Institute of Standards and Technology, Gaithersburg, MD (1997)
-
(1997)
Proceedings of the 20th NIST-NCSC National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
6
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6(3), 151-180 (1988)
-
(1988)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
7
-
-
38349038686
-
-
Ethereal, Inc.: Ethereal. Software (2007), http://www.ethereal.com
-
Ethereal, Inc.: Ethereal. Software (2007), http://www.ethereal.com
-
-
-
-
8
-
-
84934275762
-
The Folded Normal Distribution
-
Leone, F.C., Nelson, L.S., Nottingham, R.B.: The Folded Normal Distribution. Technometrics 3(4), 543-550 (1961)
-
(1961)
Technometrics
, vol.3
, Issue.4
, pp. 543-550
-
-
Leone, F.C.1
Nelson, L.S.2
Nottingham, R.B.3
-
10
-
-
0003448310
-
-
Statistics for Engineering and Information Science. Springer, New York, NY
-
Jensen, F.V.: Bayesian networks and decision graphs. Statistics for Engineering and Information Science. Springer, New York, NY (2001)
-
(2001)
Bayesian networks and decision graphs
-
-
Jensen, F.V.1
-
11
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., et al.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34, 579-595 (2000)
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
-
15
-
-
84864228244
-
-
Lunt, T., et al.: IDES: A progress report. In: Proceedings of the Sixth Annual Computer Security Applications Conference. Applied Computer Security Associates, pp. 273-285. Silver Spring, MD (1990)
-
Lunt, T., et al.: IDES: A progress report. In: Proceedings of the Sixth Annual Computer Security Applications Conference. Applied Computer Security Associates, pp. 273-285. Silver Spring, MD (1990)
-
-
-
-
16
-
-
38349059356
-
UNICORN: Misuse detection for UNICOS™
-
IEEE Press, Los Alamitos, CA
-
Christoph, G.G., et al.: UNICORN: Misuse detection for UNICOS™. In: Supercomputing '95, p. 56. IEEE Press, Los Alamitos, CA (1995)
-
(1995)
Supercomputing '95
, pp. 56
-
-
Christoph, G.G.1
-
17
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
Schonlau, M., et al.: Computer intrusion: Detecting masquerades. Statistical Science 16(1), 58-74 (2001)
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
|