-
1
-
-
0003964874
-
-
[Anderson95] SRI-CSL 95-07, SRI International
-
[Anderson95] D. Anderson, T. Lunt, H. Javitz, A. Tamaru, and A. Valdes, Next-generation Intrusion Detection Expert System (NIDES): A Summary, SRI-CSL- 95-07, SRI International, 1995.
-
(1995)
Next-generation Intrusion Detection Expert System (NIDES): A Summary
-
-
Anderson, D.1
Lunt, T.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
3
-
-
0022989344
-
From Regular Expressions to Deterministic Automata
-
[Berry86]
-
[Berry86] G. Berry and R. Sethi, From Regular Expressions to Deterministic Automata, Theoretical Computer Science 48 pp. 117-126, 1986.
-
(1986)
Theoretical Computer Science
, vol.48
, pp. 117-126
-
-
Berry, G.1
Sethi, R.2
-
4
-
-
0030092390
-
Checking for Race Conditions in File Access
-
[Bishop96]
-
[Bishop96] M. Bishop and M. Dilger, Checking for Race Conditions in File Access. Computing Systems 9(2), pp. 131-152, 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
5
-
-
84945709734
-
Derivatives of Regular Expressions
-
[Brzozowski64]
-
[Brzozowski64] J.A. Brzozowski, Derivatives of Regular Expressions, Journal of ACM Vol. 11, No.4, pp. 481-494, 1964.
-
(1964)
Journal of ACM
, vol.11
, Issue.4
, pp. 481-494
-
-
Brzozowski, J.A.1
-
6
-
-
85095977767
-
-
[Cai98] M.S. Thesis, Department of Computer Science, Iowa State University, Dec
-
[Cai98] Y. Cai. A Specification-Based Approach for Intrusion Detection. M.S. Thesis, Department of Computer Science, Iowa State University, Dec 1998.
-
(1998)
A Specification-Based Approach for Intrusion Detection
-
-
Cai, Y.1
-
7
-
-
85095968861
-
-
[CERT98] CERT Coordination Center Advisories 1988-1998
-
[CERT98] CERT Coordination Center Advisories 1988-1998, http://www.cert.org/advisories/index.html.
-
-
-
-
8
-
-
0009016272
-
An evening with berferd, in which a cracker is lured, endured and studied
-
[Cheswick92]
-
[Cheswick92] W.R. Cheswick, An evening with berferd, in which a cracker is lured, endured and studied, Winter USENIX Conference, 1992.
-
(1992)
Winter USENIX Conference
-
-
Cheswick, W.R.1
-
10
-
-
70549104461
-
Software Defenses in Real- Time Control Systems
-
[Connet72]
-
[Connet72] J. Connet et al., Software Defenses in Real- Time Control Systems, IEEE Fault-Tolerant Comp. Sys., 1972.
-
(1972)
IEEE Fault-Tolerant Comp. Sys
-
-
Connet, J.1
-
14
-
-
85084162735
-
A Secure Environment for Untrusted Helper Applications
-
[Goldberg96]
-
[Goldberg96] I. Goldberg, D. Wagner, R. Thomas, and E. Brewer, A Secure Environment for Untrusted Helper Applications, USENIX Security Symposium, 1996.
-
(1996)
USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.4
-
16
-
-
0027150412
-
A real-time intrusion detection system for UNIX
-
[Ilgun93]
-
[Ilgun93] K. Ilgun, A real-time intrusion detection system for UNIX, IEEE Symp. on Security and Privacy, 1993.
-
(1993)
IEEE Symp. on Security and Privacy
-
-
Ilgun, K.1
-
17
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
[Ko94]
-
[Ko94] C. Ko, G. Fink and K. Levitt, Automated detection of vulnerabilities in privileged programs by execution monitoring, Computer Security Application Conference, 1994.
-
(1994)
Computer Security Application Conference
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
19
-
-
0031233430
-
Intrusion detection via system call traces
-
[Kosoresow97]
-
[Kosoresow97] A. Kosoresow and S. Hofmeyr, Intrusion detection via system call traces, IEEE Software '97.
-
IEEE Software '97
-
-
Kosoresow, A.1
Hofmeyr, S.2
-
21
-
-
0028514027
-
A Taxonomy of Computer Program Security Flaws
-
[Landwehr94]
-
[Landwehr94] C. Landwehr, A. Bull, J. McDermott and W. Choi, A Taxonomy of Computer Program Security Flaws, ACM Computing Surveys 26(3), 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
-
-
Landwehr, C.1
Bull, A.2
McDermott, J.3
Choi, W.4
-
23
-
-
0027609384
-
A survey of Intrusion Detection Techniques
-
[Lunt93] June
-
[Lunt93] T. Lunt, A survey of Intrusion Detection Techniques, Computers and Security, 12(4), June 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.4
-
-
Lunt, T.1
-
25
-
-
84873309550
-
Penetration State Transition Analysis - A Rule Based Intrusion Detection Approach
-
[Porras92]
-
[Porras92] P. Porras and R. Kemmerer, Penetration State Transition Analysis - A Rule Based Intrusion Detection Approach, Computer Security Applications Conference, 1992.
-
(1992)
Computer Security Applications Conference
-
-
Porras, P.1
Kemmerer, R.2
-
28
-
-
0042185201
-
-
[Spafford91] Technical Report CSD-TR-993, Purdue University, West Lafayette September 19
-
[Spafford91] E. H. Spafford. The Internet Worm Incident, Technical Report CSD-TR-993, Purdue University, West Lafayette, IN, September 19, 1991.
-
(1991)
The Internet Worm Incident
-
-
Spafford, E. H.1
|