-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P. Anderson Co., Fort Washington, PA
-
ANDERSON, J. P. 1980, Computer Security Threat Monitoring and Surveillance, Technical Report, James P. Anderson Co., Fort Washington, PA.
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
2
-
-
0035879674
-
Intrusion detection through learning behavior model
-
BALAJINATH, B., and S. RAGHAVAN. 2001. Intrusion detection through learning behavior model. Computer Communications, 24(12):1202-1212.
-
(2001)
Computer Communications
, vol.24
, Issue.12
, pp. 1202-1212
-
-
Balajinath, B.1
Raghavan, S.2
-
4
-
-
0043235621
-
Rule-based coverage analysis applied to test case selection
-
BARR, V. 1997. Rule-based coverage analysis applied to test case selection. Annals of Software Engineering, 4.
-
(1997)
Annals of Software Engineering
, vol.4
-
-
Barr, V.1
-
7
-
-
74949104861
-
Applying genetic programming to intrusion detection
-
Technical Report, FS-95-01. AAAI Press
-
CROSBIE, M., and G. SPAFFORD. 1995. Applying genetic programming to intrusion detection. Technical Report, FS-95-01, AAAI Fall Symposium Series. AAAI Press.
-
(1995)
AAAI Fall Symposium Series
-
-
Crosbie, M.1
Spafford, G.2
-
8
-
-
33847310953
-
Adaptive model generation for intrusion detection systems
-
Workshop on Intrusion Detection and Prevention, Athens, GR
-
ESKIN, E., and M. MILLER, Z. D. ZHONG, G. YI, W-A. LEE, and S. STOLFO. 2000. Adaptive model generation for intrusion detection systems. In Workshop on Intrusion Detection and Prevention, 7th ACM Conference on Computer Security, Athens, GR.
-
(2000)
7th ACM Conference on Computer Security
-
-
Eskin, E.1
Miller, M.2
Zhong, Z.D.3
Yi, G.4
Lee, W.-A.5
Stolfo, S.6
-
9
-
-
0012292276
-
A neural network approach towards intrusion detection
-
FOX, K. L., R. R. HENNING, J. H. REED, and P. R. SIMONIAN. 1990. A neural network approach towards intrusion detection. In Proceedings of 13th National Computer Security Conference, pp. 125-134.
-
(1990)
Proceedings of 13th National Computer Security Conference
, pp. 125-134
-
-
Fox, K.L.1
Henning, R.R.2
Reed, J.H.3
Simonian, P.R.4
-
12
-
-
84948667727
-
Complete expression trees for evolving fuzzy classifiers systems with genetic algorithms and application to network intrusion detection
-
New Orleans, LA
-
GOMEZ, J., D. DASGUPTA, O. NASAROUI, and F. GONZALEZ. 2002. Complete expression trees for evolving fuzzy classifiers systems with genetic algorithms and application to network intrusion detection. In Proceedings of NAFIPS-FLINT joint Conference, New Orleans, LA, pp. 469-474.
-
(2002)
Proceedings of NAFIPS-FLINT Joint Conference
, pp. 469-474
-
-
Gomez, J.1
Dasgupta, D.2
Nasaroui, O.3
Gonzalez, F.4
-
15
-
-
0034301517
-
1999 DARPA off-line intrusion detection evaluation
-
LIPPMANN, R. 2000. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4):579-595.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
-
16
-
-
4344583370
-
Genetic algorithms: An alternative tool for security audit trails analysis
-
Supelec, France
-
ME, L. 1992. Genetic algorithms: An alternative tool for security audit trails analysis. Technical Report, Supelec, France.
-
(1992)
Technical Report
-
-
Me, L.1
|