-
1
-
-
0037002475
-
Intrusion detection: A brief history and review
-
Apr
-
R. A. Kemmerer and G. Vigna, "Intrusion detection: A brief history and review," Computer, vol. 35, no. 4, pp. 27-30, Apr. 2002.
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
2
-
-
0028430224
-
Network intrusion detection
-
May/Jun
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection," IEEE Netw., vol. 8, no. 3, pp. 26-41, May/Jun. 1994.
-
(1994)
IEEE Netw
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
3
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
Sep./Oct
-
J. McHugh, A. Christie, and J. Allen, "Defending yourself: The role of intrusion detection systems," IEEE Softw., vol. 17, no. 5, pp. 42-51, Sep./Oct. 2000.
-
(2000)
IEEE Softw
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
4
-
-
85008025302
-
Detecting attacks on networks
-
Dec
-
C. Herringshaw, "Detecting attacks on networks," Computer, vol. 30, no. 12, pp. 16-17, Dec. 1997.
-
(1997)
Computer
, vol.30
, Issue.12
, pp. 16-17
-
-
Herringshaw, C.1
-
5
-
-
0742324903
-
A formal framework for positive and negative detection schemes
-
Feb
-
F. Esponda, S. Forrest, and P. Helman, "A formal framework for positive and negative detection schemes," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 34, no. 1, pp. 357-373, Feb. 2004.
-
(2004)
IEEE Trans. Syst., Man, Cybern. B, Cybern
, vol.34
, Issue.1
, pp. 357-373
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
6
-
-
0031233430
-
Intrusion detection via system call traces
-
Sep./Oct
-
A. P. Kosoresow and S. A. Hofmeyer, "Intrusion detection via system call traces," IEEE Softw., vol. 14, no. 5, pp. 35-42, Sep./Oct. 1997.
-
(1997)
IEEE Softw
, vol.14
, Issue.5
, pp. 35-42
-
-
Kosoresow, A.P.1
Hofmeyer, S.A.2
-
7
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
Jan./Feb
-
R. F. Erbacher, K. L. Walker, and D. A. Frincke, "Intrusion and misuse detection in large-scale systems," IEEE Comput. Graph. Appl., vol. 22, no. 1, pp. 38-47, Jan./Feb. 2002.
-
(2002)
IEEE Comput. Graph. Appl
, vol.22
, Issue.1
, pp. 38-47
-
-
Erbacher, R.F.1
Walker, K.L.2
Frincke, D.A.3
-
8
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Mar
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach," IEEE Trans. Softw. Eng. vol. 21, no. 3, pp. 181-199, Mar. 1995.
-
(1995)
IEEE Trans. Softw. Eng
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
9
-
-
0031190354
-
On a pattern-oriented model for intrusion detection
-
Jul./Aug
-
S. P. Shieh and V. D. Gligor, "On a pattern-oriented model for intrusion detection," IEEE Trans. Knowl. Data Eng., vol. 9, no. 4, pp. 661-667, Jul./Aug. 1997.
-
(1997)
IEEE Trans. Knowl. Data Eng
, vol.9
, Issue.4
, pp. 661-667
-
-
Shieh, S.P.1
Gligor, V.D.2
-
10
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
Jul
-
N. Ye, X. Y. Li, Q. Chen, S. M. Emran, and M. M. Xu, "Probabilistic techniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 266-274, Jul. 2001.
-
(2001)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.Y.2
Chen, Q.3
Emran, S.M.4
Xu, M.M.5
-
11
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
May
-
S. B. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 32, no. 2, pp. 154-160, May 2002.
-
(2002)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev
, vol.32
, Issue.2
, pp. 154-160
-
-
Cho, S.B.1
-
12
-
-
0037252253
-
Determining the operational limits of an anomaly-based intrusion detector
-
Jan
-
K. M. C. Tan and R. A. Maxion, "Determining the operational limits of an anomaly-based intrusion detector," IEEE J. Sel. Areas Commun., vol. 21, no. 1, pp. 96-110, Jan. 2003.
-
(2003)
IEEE J. Sel. Areas Commun
, vol.21
, Issue.1
, pp. 96-110
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
13
-
-
0037142572
-
Anomaly intrusion detection method based on HMM
-
Jun
-
Y. Qiao, X. W. Xin, Y. Bin, and S. Ge, "Anomaly intrusion detection method based on HMM," Electron. Lett., vol. 38, no. 13, pp. 663-664, Jun. 2002.
-
(2002)
Electron. Lett
, vol.38
, Issue.13
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
14
-
-
0035402096
-
Training a neural-network based intrusion detector to recognize novel attacks
-
Jul
-
S. C. Lee and D. V. Heinbuch, "Training a neural-network based intrusion detector to recognize novel attacks," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 294-299, Jul. 2001.
-
(2001)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.31
, Issue.4
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
15
-
-
0142071646
-
Integrated access control and intrusion detection for Web servers
-
Sep
-
T. Ryutov, C. Neuman, K. Dongho, and Z. Li, "Integrated access control and intrusion detection for Web servers," IEEE Trans. Parallel Distrib. Syst., vol. 14, no. 9, pp. 841-850, Sep. 2003.
-
(2003)
IEEE Trans. Parallel Distrib. Syst
, vol.14
, Issue.9
, pp. 841-850
-
-
Ryutov, T.1
Neuman, C.2
Dongho, K.3
Li, Z.4
-
16
-
-
0031235236
-
Sensor fusion for intelligent alarm analysis
-
Sep
-
C. L. Nelson and D. S. Fitzgerald, "Sensor fusion for intelligent alarm analysis," IEEE Aerosp. Electron. Syst. Mag., vol. 12, no. 9, pp. 18-24, Sep. 1997.
-
(1997)
IEEE Aerosp. Electron. Syst. Mag
, vol.12
, Issue.9
, pp. 18-24
-
-
Nelson, C.L.1
Fitzgerald, D.S.2
-
17
-
-
0031191180
-
Traffic models in broadband networks
-
Jul
-
A. Adas, "Traffic models in broadband networks," IEEE Commun. Mag. vol. 35, no. 7, pp. 82-89, Jul. 1997.
-
(1997)
IEEE Commun. Mag
, vol.35
, Issue.7
, pp. 82-89
-
-
Adas, A.1
-
18
-
-
1942436335
-
Robustness of the Markov-chain model for cyber-attack detection
-
Mar
-
N. Ye, Y. B. Zhang, and C. M. Borror, "Robustness of the Markov-chain model for cyber-attack detection," IEEE Trans. Rel., vol. 53, no. 1, pp. 116-123, Mar. 2004.
-
(2004)
IEEE Trans. Rel
, vol.53
, Issue.1
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.B.2
Borror, C.M.3
-
19
-
-
0032761642
-
On multimedia networks: Self-similar traffic and network performance
-
Jan
-
Z. Sahinoglu and S. Tekinay, "On multimedia networks: Self-similar traffic and network performance," IEEE Commun. Mag., vol. 37, no. 1, pp. 48-52, Jan. 1999.
-
(1999)
IEEE Commun. Mag
, vol.37
, Issue.1
, pp. 48-52
-
-
Sahinoglu, Z.1
Tekinay, S.2
-
20
-
-
0035248163
-
Nested auto-regressive processes for MPEG-encoded video traffic modeling
-
Feb
-
D. R. Liu, E. I. Sara, and W. Sun, "Nested auto-regressive processes for MPEG-encoded video traffic modeling," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 169-183, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Syst. Video Technol
, vol.11
, Issue.2
, pp. 169-183
-
-
Liu, D.R.1
Sara, E.I.2
Sun, W.3
-
21
-
-
0026106846
-
Performances of order statistics CFAR
-
Mar
-
M. Shor and N. Levanon, "Performances of order statistics CFAR," IEEE Trans. Aerosp. Electron. Syst., vol. 27, no. 2, pp. 214-224, Mar. 1991.
-
(1991)
IEEE Trans. Aerosp. Electron. Syst
, vol.27
, Issue.2
, pp. 214-224
-
-
Shor, M.1
Levanon, N.2
-
22
-
-
0033352460
-
Cell-averaging CFAR detection in compound clutter with spatially correlated texture and speckle
-
Dec
-
M. Barkat and F. Soltani, "Cell-averaging CFAR detection in compound clutter with spatially correlated texture and speckle," Proc. Inst. Electr. Eng. - Radar, Sonar Navig., vol. 146, no. 6, pp. 279-284, Dec. 1999.
-
(1999)
Proc. Inst. Electr. Eng. - Radar, Sonar Navig
, vol.146
, Issue.6
, pp. 279-284
-
-
Barkat, M.1
Soltani, F.2
-
23
-
-
0029210413
-
Optimal CFAR detection in Weibull clutter
-
Jan
-
V. Anastassopoulos and G. A. Lampropoulos, "Optimal CFAR detection in Weibull clutter," IEEE Trans. Aerosp. Electron. Syst., vol. 31, no. 1, pp. 52-64, Jan. 1995.
-
(1995)
IEEE Trans. Aerosp. Electron. Syst
, vol.31
, Issue.1
, pp. 52-64
-
-
Anastassopoulos, V.1
Lampropoulos, G.A.2
-
25
-
-
0031238325
-
A target identification comparison of Bayesian and Dempster-Shafer multisensor fusion
-
Sep
-
D. M. Buede and P. Girardi, "A target identification comparison of Bayesian and Dempster-Shafer multisensor fusion," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 27, no. 5, pp. 569-577, Sep. 1997.
-
(1997)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.27
, Issue.5
, pp. 569-577
-
-
Buede, D.M.1
Girardi, P.2
-
26
-
-
0033738584
-
Bayesian and Dempster-Shafer target identification for radar surveillance
-
Apr
-
H. Leung and J. Wu, "Bayesian and Dempster-Shafer target identification for radar surveillance," IEEE Trans. Aerosp. Electron. Syst., vol. 36, no. 4, pp. 432-446, Apr. 2000.
-
(2000)
IEEE Trans. Aerosp. Electron. Syst
, vol.36
, Issue.4
, pp. 432-446
-
-
Leung, H.1
Wu, J.2
|