-
1
-
-
84862424553
-
Critical foundations: Protecting America's infrastructures
-
Oct.
-
Presidential Commission on Critical Infrastructure Protection, "Critical Foundations: Protecting America's Infrastructures," commision report, Oct. 1997, http://www.pccip.gov/report_Jndex. html.
-
(1997)
Commision Report
-
-
-
3
-
-
0036090428
-
An environment for security protocol intrusion detection
-
Jan.
-
A. Yasinsac, "An Environment for Security Protocol Intrusion Detection," J. Computer Security, vol. 10, nos. 1-2, pp. 177-188, Jan. 2002.
-
(2002)
J. Computer Security
, vol.10
, Issue.1-2
, pp. 177-188
-
-
Yasinsac, A.1
-
4
-
-
4544260009
-
A method for detecting intrusions on encrypted traffic
-
Computer Science Dept., Florida State Univ.
-
S. Goregaoker, "A Method for Detecting Intrusions on Encrypted Traffic," Technical Report TR-010703, Computer Science Dept., Florida State Univ., 2001.
-
(2001)
Technical Report
, vol.TR-010703
-
-
Goregaoker, S.1
-
5
-
-
4544257573
-
The monitor and principals
-
Computer Science Dept., Florida State Univ.
-
A. Melendez, "The Monitor and Principals," Technical Report TR-010701, Computer Science Dept., Florida State Univ., 2001.
-
(2001)
Technical Report
, vol.TR-010701
-
-
Melendez, A.1
-
6
-
-
4544299859
-
Knowledge base for intrusion detection system
-
Computer Science Dept., Florida State Univ.
-
N. Patel, "Knowledge Base for Intrusion Detection System," Technical Report TR-011203, Computer Science Dept., Florida State Univ., 2001.
-
(2001)
Technical Report
, vol.TR-011203
-
-
Patel, N.1
-
9
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
A.K. Ghosh, J. Wanken, and F. Charron, "Detecting Anomalous and Unknown Intrusions Against Programs," Proc. 1998 Computer Security Applications Conf., pp. 259-267, 1998.
-
(1998)
Proc. 1998 Computer Security Applications Conf.
, pp. 259-267
-
-
Ghosh, A.K.1
Wanken, J.2
Charron, F.3
-
10
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
June
-
D. Barbara, J. Couto, S. Jajodia, L. Popyack, and N. Wu, "ADAM: Detecting Intrusions by Data Mining," Proc. 2001 IEEE Workshop Information Assurance and Security, pp. 11-16, June 2001.
-
(2001)
Proc. 2001 IEEE Workshop Information Assurance and Security
, pp. 11-16
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
11
-
-
0003964874
-
-
Computer Science Labpratory, SRI Int'l, May
-
D. Anderson, T. Frivold, and A. Valdes, "Next-Generation Intrusion Detection Expert System (NIDES) A Summary," http://www.sdl.sri.com/papers/ 4/s/4sri/4sri.pdf, Computer Science Labpratory, SRI Int'l, May 1995.
-
(1995)
Next-generation Intrusion Detection Expert System (NIDES) A Summary
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
14
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Oct.
-
P.A. Porras and P.G. Neumann, "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances," Proc. Nat'l Information Systems Security Conf., pp. 353-365, Oct. 1997.
-
(1997)
Proc. Nat'l Information Systems Security Conf.
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
15
-
-
0032630098
-
Detecting computer and network misuse through the Production-Based Expert System Toolset (P-BEST)
-
May
-
U. Lindqvist and P.A. Porras, "Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)," Proc. 1999 IEEE Symp. Security and Privacy, pp. 146-161, May 1999.
-
(1999)
Proc. 1999 IEEE Symp. Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
20
-
-
0026630927
-
Authentication for distributed systems
-
Jan.
-
T.Y.C. Woo and S.S. Lam, "Authentication for Distributed Systems," Computer, vol. 25, no. 1, pp. 39-52, Jan. 1992.
-
(1992)
Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
23
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Nov.
-
W. Lee and S.J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," Proc. ACM Trans. Information and System Security, pp. 227-261, Nov. 2000.
-
(2000)
Proc. ACM Trans. Information and System Security
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
24
-
-
0035271352
-
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
-
N. Ye and Q. Chen, "An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems," Proc. Quality and Reliability Eng. Int'l, vol. 17, no. 2, pp. 105-112, 2001.
-
(2001)
Proc. Quality and Reliability Eng. Int'l
, vol.17
, Issue.2
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
25
-
-
0006025721
-
Identification of host audit data to detect attacks on low-level IP
-
T. Daniels and E.H. Spafford, "Identification of Host Audit Data to Detect Attacks on Low-level IP," J. Computer Security, vol. 7, no. 1, 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.1
-
-
Daniels, T.1
Spafford, E.H.2
-
26
-
-
0032630098
-
Detecting computer and network misuse through the Production-Based Expert System Toolset (P-BEST)
-
U. Lindqvist and P.A. Porras, "Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)," Proc. 1999 IEEE CS Symp. Security and Privacy, pp. 146-61, 1999.
-
(1999)
Proc. 1999 IEEE CS Symp. Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
27
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls," J. Computer Security, no. 6, pp. 151-180, 1998.
-
(1998)
J. Computer Security
, Issue.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
28
-
-
0003900915
-
An application of pattern matching in intrusion detection
-
Dept. Computer Sciences, Purdue Univ.
-
S. Kumar and E.H. Spafford, "An Application of Pattern Matching in Intrusion Detection," Technical Report CSD-TR-94-013, Dept. Computer Sciences, Purdue Univ., 1994.
-
(1994)
Technical Report
, vol.CSD-TR-94-013
-
-
Kumar, S.1
Spafford, E.H.2
-
29
-
-
0015960104
-
The string-to-string correction problem
-
Jan.
-
R.A. Wagner and M.J. Fischer, "The String-to-String Correction Problem," J. ACM, vol. 21, pp. 168-178, Jan. 1974.
-
(1974)
J. ACM
, vol.21
, pp. 168-178
-
-
Wagner, R.A.1
Fischer, M.J.2
-
31
-
-
0005329149
-
Fast text searching with errors
-
Dept. of Computer Science, Univ. of Arizona
-
S. Wu and U. Manber, "Fast Text Searching With Errors," Technical Report TR. 91-11, Dept. of Computer Science, Univ. of Arizona, 1991.
-
(1991)
Technical Report
, vol.TR. 91-11
-
-
Wu, S.1
Manber, U.2
|