-
2
-
-
84949287076
-
-
http:/ /www .cert.org/advisories
-
-
-
-
4
-
-
84949287078
-
-
http:/ /www .l1.mit.edu/IST /ideval/index.html
-
-
-
-
5
-
-
33745293149
-
The use of information retrieval techniques for intrusion detection
-
Louvain-Ia-Neuve, Belgium, September
-
R. Anderson and A. Khattak. "The Use of Information Retrieval Techniques for Intrusion Detection" , In Proceedings of RAID'98, Louvain-Ia-Neuve, Belgium, September 1998
-
(1998)
Proceedings of RAID'98
-
-
Anderson, R.1
Khattak, A.2
-
6
-
-
84949287079
-
Effects of detail in wireless network simulation
-
Nirupama Bulusu, Jeremy Elson, Deborah Estrin, Ramesh Govindan, John Heidemann, Chalermek Intanagonwiwat, Nader Salehi, Kun-chan Lan, Ya Xu, and Wei Ye. "Effects of Detail in Wireless Network Simulation" , USC/ISI TR-20000-523
-
USC/ISI TR-20000-523
-
-
Bulusu, N.1
Elson, J.2
Estrin, D.3
Govindan, R.4
Heidemann, J.5
Intanagonwiwat, C.6
Salehi, N.7
Lan, K.-C.8
Xu, Y.9
Ye, W.10
-
7
-
-
0038458235
-
Defending a computer system using autonomous agents
-
Purdue University, March
-
M. Crosbie and E. Spafford. "Defending a Computer System using Autonomous Agents" , Technical Report No.95-022, COAST Laboratory, Department of Computer Sciences, Purdue University, March 1994
-
(1994)
Technical Report No.95-022, COAST Laboratory, Department of Computer Sciences
-
-
Crosbie, M.1
Spafford, E.2
-
8
-
-
2542563730
-
An experimentation workbench for intrusion detection systems
-
Switzerland, March
-
H. Debar, M. Dacier, A. Wespi, and S. Lampart. "An Experimentation Workbench for Intrusion Detection Systems" , Research Report RZ 2998, IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, March 1998
-
(1998)
Research Report RZ 2998, IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
9
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
July
-
R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo. "Testing and Evaluating Computer Intrusion Detection Systems" , Communications of the ACM, July 1999
-
(1999)
Communications of the ACM
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
12
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
Washington, D.C., USA, August 23-26
-
A. Ghosh and A. Schwartzbard. "A Study in Using Neural Networks for Anomaly and Misuse Detection" , In Proceedings of the 8th USENIX Security Symposium, Washington, D.C., USA, August 23-26,1999
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Ghosh, A.1
Schwartzbard, A.2
-
13
-
-
0024984013
-
A network security monitor
-
T. Heberlein, G. Dias, K. Levit, B. Mukherjee, J. Wood, and D. Wolber. "A Network Security Monitor" , In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pages 296-304
-
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, T.1
Dias, G.2
Levit, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
14
-
-
0039952569
-
An expert system application for network intrusion detection
-
Washington, D.C., October 1-4
-
K. Jackson, D. Dubois, and C. Stallings. "An Expert System Application for Network Intrusion Detection" , In Proceedings of the 14th National Computer Security Conference, pages 215-225, Washington, D.C., October 1-4, 1991
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 215-225
-
-
Jackson, K.1
Dubois, D.2
Stallings, C.3
-
15
-
-
0011066222
-
Applying mobile agents to intrusion detection and response
-
October
-
W. Jansen, P. Mell, T. Karygiannis, and D. Marks. "Applying Mobile Agents to Intrusion Detection and Response" , Interim Report-6416, Computer Security Division, National Institute of Standards and Technology, October 1999
-
(1999)
Interim Report-6416, Computer Security Division, National Institute of Standards and Technology
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
16
-
-
84949287081
-
Neural networks applied in intrusion detection systems
-
WCCI'98, Anchorage, USA
-
J. Bonifacio, A. Cansian, A. Carvalho, and E. Moreira. "Neural Networks Applied in Intrusion Detection Systems" , In Proceedings of the IEEE World Congress on Computational Intelligence , WCCI'98, Anchorage, USA
-
Proceedings of the IEEE World Congress on Computational Intelligence
-
-
Bonifacio, J.1
Cansian, A.2
Carvalho, A.3
Moreira, E.4
-
17
-
-
0003900915
-
An application of pattern matching in intrusion detection
-
Purdue University, West Lafayette, IN, USA, June 17
-
S. Kumar and E. Spafford. "An Application of Pattern Matching in Intrusion Detection" , Technical Report CSD-TR-94-013, The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, June 17 1994
-
(1994)
Technical Report CSD-TR-94-013, the COAST Project, Department of Computer Sciences
-
-
Kumar, S.1
Spafford, E.2
-
18
-
-
84940104123
-
A datamining framework for building intrusion detection models
-
Berkeley, California, May
-
W. Lee. "A Datamining Framework for Building Intrusion Detection Models" , In IEEE Symposium on Security and Privacy, pages 120-132, Berkeley, California, May 1999
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
-
19
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Jan 25-27, Hilton Head, SC
-
R. Lippmann, and I. Graf. "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation" , In Proceedings of DARPA Information Survivability Conference and Exposition, DISCEX'OO, Jan 25-27, Hilton Head, SC, 2000
-
(2000)
Proceedings of DARPA Information Survivability Conference and Exposition, discex'Oo
-
-
Lippmann, R.1
Graf, I.2
-
22
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Oct
-
N. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. Olsson. " A Methodology for Testing Intrusion Detection Systems" , IEEE Tmnsactions on Software Engineering, Vol 22, No.10, Oct 1996, pp. 719-729
-
(1996)
IEEE Tmnsactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.5
-
23
-
-
3643079262
-
A software platform for testing intrusion detection systems
-
N. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. Olsson. " A software Platform for Testing Intrusion Detection Systems" , IEEE Software, 1997
-
(1997)
IEEE Software
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.5
-
24
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
May
-
C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, and D. Zamboni. " Analysis of a Denial of Service Attack on TCP " , In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 208-223, May 1997
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, E.4
Sundaram, A.5
Zamboni, D.6
|