-
1
-
-
0003482133
-
-
Sparta, NJ: Intrusion.Net Books
-
Amoroso, E.G. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. Sparta, NJ: Intrusion.Net Books, 1999.
-
(1999)
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response
-
-
Amoroso, E.G.1
-
2
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3, 3 (2000), 186-205.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
3
-
-
2642515264
-
-
White Paper, United States Department of Commerce, Gaithersburg, MD, available at
-
Bace, R., and Mell, P. NIST special publication on intrusion detection systems. White Paper, United States Department of Commerce, Gaithersburg, MD, 2001 (available at http://csrc.nist.gov/publications/ nistpubs/800-31/sp800-31.pdf).
-
(2001)
NIST special publication on intrusion detection systems
-
-
Bace, R.1
Mell, P.2
-
4
-
-
35248836533
-
Using specification-based intrusion detection for automated response
-
G. Vigna, E. Jonsson, and C. Krugel eds, Berlin: Springer
-
Balepin, I.; Maltsev, S.; Rowe, J.; and Levitt, K. Using specification-based intrusion detection for automated response. In G. Vigna, E. Jonsson, and C. Krugel (eds.), Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003). Berlin: Springer, 2003, pp. 136-154.
-
(2003)
Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003)
, pp. 136-154
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.4
-
5
-
-
0142221933
-
An intrusion response taxonomy and its role in automatic intrusion response
-
Los Alamitos, CA: IEEE Computer Society
-
Carver, C.A., Jr., and Pooch, U.W. An intrusion response taxonomy and its role in automatic intrusion response. In Proceedings of the 2000 IEEE Workshop on Information Assurance and Security. Los Alamitos, CA: IEEE Computer Society, 2000, pp. 129-135.
-
(2000)
Proceedings of the 2000 IEEE Workshop on Information Assurance and Security
, pp. 129-135
-
-
Carver Jr., C.A.1
Pooch, U.W.2
-
6
-
-
18944385964
-
The value of intrusion detection systems (IDSs) in information technology security architecture
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The value of intrusion detection systems (IDSs) in information technology security architecture. Information Systems Research, 16, 1 (2005), 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
7
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu, H., and Raghunathan, S. Configuration of detection software: A comparison of decision and game theory approaches. Decision Analysis, 1, 3 (2004), 131-148.
-
(2004)
Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
8
-
-
7444252882
-
Poaching and the misappropriation of information: Transaction risks of information exchange
-
Fall
-
Clemons, E.K., and Hitt, L.M. Poaching and the misappropriation of information: Transaction risks of information exchange. Journal of Management Information Systems, 21, 2 (Fall 2004), 87-107.
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.2
, pp. 87-107
-
-
Clemons, E.K.1
Hitt, L.M.2
-
9
-
-
5844352567
-
Adaptive information systems control: A reliability-based approach
-
Fall
-
De, P., and Hsu, C. Adaptive information systems control: A reliability-based approach. Journal of Management Information Systems, 3, 2 (Fall 1986), 33-51.
-
(1986)
Journal of Management Information Systems
, vol.3
, Issue.2
, pp. 33-51
-
-
De, P.1
Hsu, C.2
-
10
-
-
70449879440
-
Toward the design of robust information systems
-
Spring
-
El Sawy, O.A., and Nanus, B. Toward the design of robust information systems. Journal of Management Information Systems, 5, 4 (Spring 1999), 33-54.
-
(1999)
Journal of Management Information Systems
, vol.5
, Issue.4
, pp. 33-54
-
-
El Sawy, O.A.1
Nanus, B.2
-
13
-
-
3242808612
-
-
White Paper, Computer Security Institute, San Francisco, CA
-
Gordon, L.A.; Loeb, M.P.; Lucyshyn, W.; and Richardson, R. 2005 CSI/FBI computer crime and security survey. White Paper, Computer Security Institute, San Francisco, CA, 2005.
-
(2005)
CSI/FBI computer crime and security survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
14
-
-
3242665740
-
Information exploitation and interorganizational systems ownership
-
Fall
-
Han, K.; Kauffman, R.J.; and Nault, B.R. Information exploitation and interorganizational systems ownership. Journal of Management Information Systems, 21, 2 (Fall 2004), 109-135.
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.2
, pp. 109-135
-
-
Han, K.1
Kauffman, R.J.2
Nault, B.R.3
-
15
-
-
0033872873
-
Improving manufacturing performance through process change and knowledge creation
-
Janice, C., and Gaimon, C. Improving manufacturing performance through process change and knowledge creation. Management Science, 46, 2 (2000), 265-288.
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 265-288
-
-
Janice, C.1
Gaimon, C.2
-
16
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch, K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, 6, 4 (2003), 443-471.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
17
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Los Alamitos, CA: IEEE Computer Society
-
Lippmann, R.P.; Fried, D.J.; Graf, I.; Haines, J.W.; Kendall, K.R.; McClung, D.; Weber, D.; Webster, S.E.; Wyschogrod, D.; Cunningham, R.K.; and Zissman, M.A. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In DARPA Information Survivability Conference and Exposition, 2000 (DISCEX '00), vol. 2. Los Alamitos, CA: IEEE Computer Society, 2000, pp. 12-26.
-
(2000)
DARPA Information Survivability Conference and Exposition, 2000 (DISCEX '00)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
18
-
-
0018079655
-
Basic principles of ROC analysis
-
Metz, C.E. Basic principles of ROC analysis. Seminars in Nuclear Medicine, 8, 4 (1978), 283-298.
-
(1978)
Seminars in Nuclear Medicine
, vol.8
, Issue.4
, pp. 283-298
-
-
Metz, C.E.1
-
19
-
-
84882800335
-
Simple, state-based approaches to program-based anomaly detection
-
Michael, C.C., and Ghosh, A. Simple, state-based approaches to program-based anomaly detection. ACM Transactions on Information and System Security, 5, 3 (2002), 203-237.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 203-237
-
-
Michael, C.C.1
Ghosh, A.2
-
20
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning, P.; Cui, Y.; Reeves, D.S.; and Xu, D. Techniques and tools for analyzing intrusion alerts. ACM Transactions on Information and System Security, 7, 2 (2004), 274-318.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
21
-
-
84949512710
-
Security agility in response to intrusion detection
-
Los Alamitos, CA: IEEE Computer Society
-
Petkac, M., and Badger, L. Security agility in response to intrusion detection. In Proceedings of the Sixteenth Annual Computer Security Applications Conference. Los Alamitos, CA: IEEE Computer Society, 2000, pp. 11-20.
-
(2000)
Proceedings of the Sixteenth Annual Computer Security Applications Conference
, pp. 11-20
-
-
Petkac, M.1
Badger, L.2
-
23
-
-
70449846056
-
Risk analysis for information technology
-
Summer
-
Rainer, R.K.; Snyder, C.A.; and Carr, H.H. Risk analysis for information technology. Journal of Management Information Systems, 8, 1 (Summer 1991), 129-148.
-
(1991)
Journal of Management Information Systems
, vol.8
, Issue.1
, pp. 129-148
-
-
Rainer, R.K.1
Snyder, C.A.2
Carr, H.H.3
-
25
-
-
36949004275
-
Software decoys for software counterintelligence
-
Rowe, N.C.; Michael, M.; Auguston, J.B.; and Riehle, R. Software decoys for software counterintelligence. IAnewsletter, 5, 1 (2002), 10-12.
-
(2002)
IAnewsletter
, vol.5
, Issue.1
, pp. 10-12
-
-
Rowe, N.C.1
Michael, M.2
Auguston, J.B.3
Riehle, R.4
-
26
-
-
84962267363
-
Infrastructrure for intrusion detection and response
-
Los Alamitos, CA: IEEE Computer Society
-
Schnackenberg, D.; Djahandari, K.; and Sterne, D. Infrastructrure for intrusion detection and response. In DARPA Information Survivability Conference and Exposition, 2000 (DISCEX '00), vol. 2. Los Alamitos, CA: IEEE Computer Society, 2000, pp. 3-11.
-
(2000)
DARPA Information Survivability Conference and Exposition, 2000 (DISCEX '00)
, vol.2
, pp. 3-11
-
-
Schnackenberg, D.1
Djahandari, K.2
Sterne, D.3
-
28
-
-
0031288377
-
Reengineering effectiveness and the redesign of organizational control: A case study of the inland revenue authority of Singapore
-
Summer
-
Sia, S.K., and Neo, B.S. Reengineering effectiveness and the redesign of organizational control: A case study of the inland revenue authority of Singapore. Journal of Management Information Systems, 14, 1 (Summer 1997), 69-92.
-
(1997)
Journal of Management Information Systems
, vol.14
, Issue.1
, pp. 69-92
-
-
Sia, S.K.1
Neo, B.S.2
-
29
-
-
13944271875
-
-
Sinha, A.P., and May, J.H. Evaluating and tuning predictive data mining models using receiver operating characteristic curves. Journal of Management Information Systems, 21, 3 (Winter 2004-5), 249-280.
-
Sinha, A.P., and May, J.H. Evaluating and tuning predictive data mining models using receiver operating characteristic curves. Journal of Management Information Systems, 21, 3 (Winter 2004-5), 249-280.
-
-
-
-
30
-
-
33748594201
-
An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
-
Spring
-
Sun, L.; Srivastava, R.P.; and Mock, T.J. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22, 4 (Spring 2006), 109-142.
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.1
Srivastava, R.P.2
Mock, T.J.3
-
31
-
-
12244283592
-
-
SP 800-55, NIST. White Paper, United States Department of Commerce, Gaithersburg, MD, available at
-
Swanson, M.; Bartol, N.; Sabato, J.; Hash, J.; and Graffo, L. Security metrics guide for information technology systems. SP 800-55, NIST. White Paper, United States Department of Commerce, Gaithersburg, MD, 2003 (available at http://csrc.nist.gov/publications/nistpubsl),
-
(2003)
Security metrics guide for information technology systems
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
32
-
-
0023890867
-
Measuring the accuracy of diagnostic systems
-
June
-
Swets, J.A. Measuring the accuracy of diagnostic systems. Science, 240, 4857 (June 1988) 1285-1293.
-
(1988)
Science
, vol.240
, Issue.4857
, pp. 1285-1293
-
-
Swets, J.A.1
-
33
-
-
84948979531
-
Evaluating the impact of automated intrusion response mechanisms
-
Los Alamitos, CA: IEEE Computer Society
-
Toth, T., and Kruegel, C. Evaluating the impact of automated intrusion response mechanisms. In Proceedings of the Eighteenth Annual Computer Security Applications Conference. Los Alamitos, CA: IEEE Computer Society, 2002, pp. 301-310.
-
(2002)
Proceedings of the Eighteenth Annual Computer Security Applications Conference
, pp. 301-310
-
-
Toth, T.1
Kruegel, C.2
-
34
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Ulvila, J.W., and Gaffney, J.E., Jr. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis, 1, 1 (2004), 35-50.
-
(2004)
Decision Analysis
, vol.1
, Issue.1
, pp. 35-50
-
-
Ulvila, J.W.1
Gaffney Jr., J.E.2
-
35
-
-
84903755100
-
Honeypots for distributed denial of service attacks
-
Los Alamitos, CA: IEEE Computer Society
-
Weiler, N. Honeypots for distributed denial of service attacks. In Eleventh IEEE WET ICE Workshop on Enterprise Security (WETICE'02). Los Alamitos, CA: IEEE Computer Society, 2002, pp. 9-14.
-
(2002)
Eleventh IEEE WET ICE Workshop on Enterprise Security (WETICE'02)
, pp. 9-14
-
-
Weiler, N.1
-
36
-
-
14644423267
-
Relevant data expansion for learning concept drift from sparsely labeled data
-
Widyantoro, D.H., and Yen, J. Relevant data expansion for learning concept drift from sparsely labeled data. IEEE Transactions on Knowledge and Data Engineering, 17, 3 (2005), 401-412.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.3
, pp. 401-412
-
-
Widyantoro, D.H.1
Yen, J.2
-
37
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
Ye, N.; Emran, S.M.; Chen, Q.; and Vilbert, S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers, 51, 7 (2002), 810-820.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
|