-
2
-
-
84944220475
-
Adaptive, Model-Based Monitoring for Cyber Attack Detection
-
Proceedings of the third International Workshop, Recent Advances in Intrusion Detection RAID, October
-
Valdes, A., Skinner, K.: Adaptive, Model-Based Monitoring for Cyber Attack Detection. In Proceedings of the third International Workshop, Recent Advances in Intrusion Detection (RAID) 2000, Springer-Verlag Lecture Notes in Computer Science, October 2000.
-
(2000)
Springer-Verlag Lecture Notes in Computer Science
-
-
Valdes, A.1
Skinner, K.2
-
3
-
-
0242325497
-
Building Scenarios from a Heterogeneous Alert Stream
-
United States Military Academy, West Point, NY, 5-6 June
-
Dain, O. M., Cunningham,. Building Scenarios from a Heterogeneous Alert Stream. In IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 June 2001.
-
(2001)
IEEE Workshop on Information Assurance and Security
-
-
Dain, O.1
Cunningham, M.2
-
4
-
-
14544297015
-
Statistical Causality Analysis of INFOSEC Alert Data
-
Lee, W., Qin, X.: Statistical Causality Analysis of INFOSEC Alert Data. In: RAID2003.
-
RAID2003
-
-
Lee, W.1
Qin, X.2
-
6
-
-
34347238396
-
A Probabilistic-Based Framework for INFOSEC Alert Correlation
-
Georgia Institute of Technology, Aug
-
Qin, X: A Probabilistic-Based Framework for INFOSEC Alert Correlation. In: College of Computing Georgia Institute of Technology, Aug. 2005.
-
(2005)
College of Computing
-
-
Qin, X.1
-
7
-
-
0242529344
-
Aggregation and Correlation of Intrusion-Detection Alerts
-
Proceedings of the 4th International Symposium, Recent Advances in Intrusion Detection RAID, October
-
Debar, H., Wespi, A.:Aggregation and Correlation of Intrusion-Detection Alerts. In Proceedings of the 4th International Symposium, Recent Advances in Intrusion Detection (RAID) 2001, Springer-Verlag Lecture Notes in Computer Science, October 2001.
-
(2001)
Springer-Verlag Lecture Notes in Computer Science
-
-
Debar, H.1
Wespi, A.2
-
8
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Nov 18-22, Washington, DC, United States
-
P. Ning, Y. Cui, and D. S. Reeves: Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Nov 18-22 2002, Washington, DC, United States, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
9
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
P. Ning, Y. Cui, D. S. Reeves, and D. Xu: Techniques and tools for analyzing intrusion alerts. In: ACM Transactions on Information and System Security, vol. 7, pp. 274, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, pp. 274
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
14
-
-
84860495162
-
Modeling multistep cyber attacks for scenario recognition
-
Washington, D.C, April
-
S. Cheung, U. Lindqvist, M. W. Fong: Modeling multistep cyber attacks for scenario recognition. In: Proceedings of the Third DARPA Information Conference and Exposition (DISCEX III), Washington, D.C., April 2003.
-
(2003)
Proceedings of the Third DARPA Information Conference and Exposition (DISCEX
, vol.3
-
-
Cheung, S.1
Lindqvist, U.2
Fong, M.W.3
-
15
-
-
3142546405
-
Mining Event Data for Actionable Patterns
-
Orlando, FL, December, The Computer Measurement Group
-
J. L. Hellerstein and S. Ma: Mining Event Data for Actionable Patterns. In: Proceedings of the CMG 2000 International Conference, Orlando, FL, December 2000, The Computer Measurement Group (2000).
-
(2000)
Proceedings of the CMG 2000 International Conference
-
-
Hellerstein, J.L.1
Ma, S.2
-
16
-
-
1542728250
-
Mining sequential patterns
-
9910, IBM Almaden Research Center, San Jose, California, October
-
R. Agrawal and R. Srikant: Mining sequential patterns. In: Research Report RJ 9910, IBM Almaden Research Center, San Jose, California, October 1994.
-
(1994)
Research Report RJ
-
-
Agrawal, R.1
Srikant, R.2
-
18
-
-
47349108431
-
Gula, R.: Correlating IDS Alerts with Vulnerability Information. Tenable Network Security
-
Gula, R.: Correlating IDS Alerts with Vulnerability Information. Tenable Network Security. 2002.technical report.
-
(2002)
technical report
-
-
|