-
1
-
-
33745449771
-
Anomaly Intrusion Detection based on Biometrics
-
June 15-17, West Point, NY, USA
-
Ahmed, A., Traore, I. 2005. Anomaly Intrusion Detection based on Biometrics. Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, June 15-17, 2005, West Point, NY, USA. Pages 452-453.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
, pp. 452-453
-
-
Ahmed, A.1
Traore, I.2
-
2
-
-
84944736505
-
Intrusion Detection: A Bioinformatics Approach
-
December 8-12, Las Vegas, NV, USA
-
th Computer Security Applications Conference, December 8-12, 2003, Las Vegas, NV, USA. Pages 24-33.
-
(2003)
th Computer Security Applications Conference
, pp. 24-33
-
-
Coull, S.1
-
3
-
-
0023294428
-
An Intrusion Detection Model
-
Feb
-
Denning, D. 1987. An Intrusion Detection Model. IEEE Transactions on Software Engineering. Volume SE-13. Issue 2. Feb. 1987. Pages 222-232.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
4
-
-
33845948788
-
-
Garg, A., et al. 2006. Profiling Users in GUI Based Systems for Masquerade Detection. Proceedings of the 2006 IEEE Workshop on Information Assurance. June 21-23, 2006, West Point, NY, USA. Pages 48-56.
-
Garg, A., et al. 2006. Profiling Users in GUI Based Systems for Masquerade Detection. Proceedings of the 2006 IEEE Workshop on Information Assurance. June 21-23, 2006, West Point, NY, USA. Pages 48-56.
-
-
-
-
5
-
-
15944403914
-
-
Li, L., Manikopoulos, M. 2004. Windows NT One-class Masquerade Detection. Proceedings of the 2004 IEEE Workshop on Information Assurance. June 10-11, 2004, West Point, NY, USA. Pages 82-87
-
Li, L., Manikopoulos, M. 2004. Windows NT One-class Masquerade Detection. Proceedings of the 2004 IEEE Workshop on Information Assurance. June 10-11, 2004, West Point, NY, USA. Pages 82-87
-
-
-
-
6
-
-
0036931591
-
-
Maxion, R., Townsend, T. 2002. Masquerade Detection Using Truncated Command Lines. Proceedings of the 2002 IEEE International Conference on Dependable Systems and Networks. June 23-26, 2002. Pages 219-228.
-
Maxion, R., Townsend, T. 2002. Masquerade Detection Using Truncated Command Lines. Proceedings of the 2002 IEEE International Conference on Dependable Systems and Networks. June 23-26, 2002. Pages 219-228.
-
-
-
-
7
-
-
48749092545
-
-
MSDN Library. URL:, Accessed 10/23/06
-
Microsoft Corporation. 2006. Hooks. MSDN Library. URL: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/ winui/winui/windowsuserinterface/windowing/hooks.asp. Accessed 10/23/06.
-
(2006)
Hooks
-
-
-
8
-
-
48749113595
-
-
URL:, Accessed 10/23/06
-
Newcomer, J. 2001. Hooks and DLLs. URL: http://www.flounder.com/ hooks.htm. Accessed 10/23/06.
-
(2001)
Hooks and DLLs
-
-
Newcomer, J.1
-
9
-
-
20444496997
-
-
Pusara, M., and Brodley, C. 2004. User Re-authentication via Mouse Movements. Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. October 29, 2004, Washington D.C., USA.
-
Pusara, M., and Brodley, C. 2004. User Re-authentication via Mouse Movements. Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. October 29, 2004, Washington D.C., USA.
-
-
-
-
10
-
-
0012282403
-
Computer Intrusion: Detecting Masquerades
-
February
-
Schonlau, M., et al. 2001. Computer Intrusion: Detecting Masquerades. Statistical Science, 16(1): 58-74. February 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
-
11
-
-
0022129862
-
Identity Verification Through Keyboard Characteristics
-
Umphress, D., Williams, G. 1985. Identity Verification Through Keyboard Characteristics. International Journal of Man-Machine Studies, Volume 23, Issue 3, Pages 263-273.
-
(1985)
International Journal of Man-Machine Studies
, vol.23
, Issue.3
, pp. 263-273
-
-
Umphress, D.1
Williams, G.2
|