-
1
-
-
3042601656
-
-
T.Abbes, A.Bouhoula, M.Rusinowitch, Protocol Analysis in Intrusion Detection Using Decision Tree. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC' 04), IEEE, 2004.
-
[1]T.Abbes, A.Bouhoula, M.Rusinowitch, "Protocol Analysis in Intrusion Detection Using Decision Tree". Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC' 04), IEEE, 2004.
-
-
-
-
2
-
-
84860099664
-
-
[2]Ad-Aware, http://www.lavasoftusa.com/software/adaware/, 2004.
-
(2004)
Ad-Aware
-
-
-
3
-
-
33644535884
-
STATL: An Attack Language for State-based Intrusion Detection
-
Athens, Greece, November
-
[3]S.T.Eckmann, G.Vigna and R.A. Kemmerer, "STATL: An Attack Language for State-based Intrusion Detection", Proceedings of the ACM Workshop on Intrusion Detection Systems, Athens, Greece, November 2000.
-
(2000)
Proceedings of the ACM Workshop on Intrusion Detection Systems
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
4
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection System
-
March
-
[4]K.Ilgun, R.A.Kemmerer, and P.A.Porras. "State Transition Analysis: A Rule-Based Intrusion Detection System", IEEE Transactions on Software Engineering, 21(3): 181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
6
-
-
0003442287
-
-
Knowledge discovery in databases DARPA archive
-
Knowledge discovery in databases DARPA archive. Task Description. http://kdd.ics.uci.edu/databases/kddcup99/task.html
-
Task Description
-
-
-
8
-
-
0036038437
-
Service-specific Anomaly Detection for Network Intrusion Detection
-
ACM Scientific Press,March
-
[8]C.Kruegel, T.Toth, and E.Kirda. "Service-specific Anomaly Detection for Network Intrusion Detection", In Symposium on Applied Computing (SAC), ACM Scientific Press,March 2002.
-
(2002)
Symposium on Applied Computing (SAC)
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
9
-
-
35248819234
-
Using decision trees to improve signature-based intrusion detection
-
th International Workshop on the Recent Advances in Intrusion Detection RAID'2003, November
-
th International Workshop on the Recent Advances in Intrusion Detection (RAID'2003), LNCS v.2820, pages 173-191, November 2003.
-
(2003)
LNCS
, vol.2820
, pp. 173-191
-
-
Krugel, C.1
Toth, T.2
-
10
-
-
0029308744
-
The Application of Semantic Classification Trees to Natural Language Understanding
-
May
-
[10]R.Kuhn and R.D.Mori. "The Application of Semantic Classification Trees to Natural Language Understanding". In IEEE transactions on pattern analysis and machine intelligence, Vol. 17, No. 5, May 1995.
-
(1995)
IEEE transactions on pattern analysis and machine intelligence
, vol.17
, Issue.5
-
-
Kuhn, R.1
Mori, R.D.2
-
11
-
-
0032630098
-
Detecting Computer and Network Misuse with the Production-Based Expert System Toolset(P-BEST)
-
Oakland,California,May
-
[11]U.Lindqvist and P.A.Porras. "Detecting Computer and Network Misuse with the Production-Based Expert System Toolset(P-BEST)".In IEEE Symposium on Security and Privacy, pages 146-161 ,Oakland,California,May 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
12
-
-
3042639257
-
A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection System
-
[12]R.Liu, N.Huang, C.Kao, C.Chen, C.Chou."A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection System". Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), IEEE, Vol.1, pp.97 - 101.
-
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), IEEE
, vol.1
, pp. 97-101
-
-
Liu, R.1
Huang, N.2
Kao, C.3
Chen, C.4
Chou, C.5
-
13
-
-
43449110398
-
-
Luo.S and Marin.G.A, Modeling networking protocols to test intrusion detection systems, Local Computer Networks, 2004. 29th Annual IEEE International Conference on 16-18 Nov. 2004.
-
Luo.S and Marin.G.A," Modeling networking protocols to test intrusion detection systems, "Local Computer Networks, 2004. 29th Annual IEEE International Conference on 16-18 Nov. 2004.
-
-
-
-
14
-
-
43449123001
-
-
Microsoft security bulletin ms02-039. January
-
[14]Microsoft security bulletin ms02-039. January 2003. http://www.microsoft.com/technet/treeview/default.as p?url=/technet/security/ bulletin/MS02-039.asp.
-
(2003)
-
-
-
15
-
-
43449089750
-
-
Mogul.J, Fielding. R, Gettys.J, Frystyk.H, Masinter.L, Leach.P, Bemers-Lee.T, June 1999.RFC2616: Hypertext Transfer Protocol -HTTP/1.1.
-
Mogul.J, Fielding. R, Gettys.J, Frystyk.H, Masinter.L, Leach.P, Bemers-Lee.T, June 1999.RFC2616: Hypertext Transfer Protocol -HTTP/1.1.
-
-
-
-
19
-
-
0142071646
-
Integrated Access Control and Intrusion Detection for Web Servers
-
September
-
[19]T.Ryutov,C.Neuman,D.Kim,L.Zhou. "Integrated Access Control and Intrusion Detection for Web Servers". In IEEE transactions on parallel and distributed systems.Vol.14, No. 9, September 2003.
-
(2003)
IEEE transactions on parallel and distributed systems
, vol.14
, Issue.9
-
-
Ryutov, T.1
Neuman, C.2
Kim, D.3
Zhou, L.4
-
20
-
-
43449110037
-
-
http://www.xambala.com
-
-
-
-
21
-
-
43449106738
-
-
Seshadri. V.R,Balaji, Vaidehi. V,Srinivasan.N Semantic Intrusion Detection System-Interm Technical Report, Xambala Inc.,2006.
-
Seshadri. V.R,Balaji, Vaidehi. V,Srinivasan.N "Semantic Intrusion Detection System-Interm Technical Report", Xambala Inc.,2006.
-
-
-
-
23
-
-
14844315860
-
-
[23]SpywareBlaster, http://www.javacoolsoftware.com/spywareblaster.html /,2004.
-
(2004)
SpywareBlaster
-
-
-
25
-
-
85084164413
-
Bro: A System for detecting network intruders in real-time
-
San Antonio, TX, USA, January
-
th USENIX Security Symposium, San Antonio, TX, USA, January 1998.
-
(1998)
th USENIX Security Symposium
-
-
Paxson, V.1
-
27
-
-
43449138144
-
-
Yu.X, Jianping.W and Yin.X,Study on Conformance Testing of Hypertext Transfer Protocol,In Proceedings of ICCT 2003,Department of Computer Science, Tsinghua University, Beijing, 100084, China.
-
Yu.X, Jianping.W and Yin.X,"Study on Conformance Testing of Hypertext Transfer Protocol",In Proceedings of ICCT 2003,Department of Computer Science, Tsinghua University, Beijing, 100084, China.
-
-
-
|