-
2
-
-
0033712953
-
Statistical Traffic Modeling for Network Intrusion Detection
-
San Francisco, CA, August IEEE Computer Society
-
J. B. D. Cabrera, B. Ravichandran, and R. K. Mehra. Statistical Traffic Modeling for Network Intrusion Detection. In Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, pages 466-473, San Francisco, CA, August 2000. IEEE Computer Society.
-
(2000)
Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 466-473
-
-
Cabrera, J.B.D.1
Ravichandran, B.2
Mehra, R.K.3
-
3
-
-
0008723266
-
-
Technical Report Department of Energy - CIAC (Computer Incident Advisory Capability), February
-
P. J. Criscuolo. Distributed Denial of Service - Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht. Technical Report CIAC-2319, Department of Energy - CIAC (Computer Incident Advisory Capability), February 2000.
-
(2000)
Distributed Denial of Service - Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht
-
-
Criscuolo, P.J.1
-
4
-
-
1942531188
-
ISCP: Design and Implementation of an Inter-Domain Security Management Agent (SMA) Coordination Protocol
-
IEEE Publishing
-
Z. Fu, H. Huang, T. Wu, S. Wu, F. Gong, C. Xu, and I. Baldine. ISCP: Design and Implementation of an Inter-Domain Security Management Agent (SMA) Coordination Protocol. Proceedings of NOMS, 2000. IEEE Publishing.
-
(2000)
Proceedings of NOMS
-
-
Fu, Z.1
Huang, H.2
Wu, T.3
Wu, S.4
Gong, F.5
Xu, C.6
Baldine, I.7
-
5
-
-
0000351727
-
Investigating causal relations by econometric models and cross-spectral methods
-
C. W. J. Granger. Investigating causal relations by econometric models and cross-spectral methods. Econometrica, 34:424-438, 1969.
-
(1969)
Econometrica
, vol.34
, pp. 424-438
-
-
Granger, C.W.J.1
-
9
-
-
84952364771
-
-
Technical report, Scientific Systems Company, Inc.
-
R. K. Mehra, K. M. Nagpal, and R. K. Prasanth. Deterministic-stochastic realization algorithms (DSRA). Technical report, Scientific Systems Company, Inc., 1997.
-
(1997)
Deterministic-stochastic Realization Algorithms (DSRA)
-
-
Mehra, R.K.1
Nagpal, K.M.2
Prasanth, R.K.3
-
10
-
-
0028430224
-
Network intrusion detection
-
May
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt. Network intrusion detection. IEEE Network, 8(3):26-41, May 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
12
-
-
1942531189
-
Internet Security - Anatomy of an Attack
-
February 19
-
Science and Technology Section. Internet Security - Anatomy of an Attack. The Economist, February 19, 2000, pages 80-81.
-
(2000)
The Economist
, pp. 80-81
-
-
Science and Technology Section1
-
13
-
-
0000859754
-
TCP/IP Illustrated
-
Addison-Wesley
-
W. R. Stevens. TCP/IP Illustrated, Vol. 1: The Protocols. Addison-Wesley, 1994.
-
(1994)
The Protocols
, vol.1
-
-
Stevens, W.R.1
-
15
-
-
0032154135
-
Proactive anomaly detection using distributed agents
-
September
-
M. Thottan and C. Ji. Proactive anomaly detection using distributed agents. IEEE Network, pages 21-27, September 1998.
-
(1998)
IEEE Network
, pp. 21-27
-
-
Thottan, M.1
Ji, C.2
-
16
-
-
84949811163
-
An Approach to On-Line Predictive Detection
-
San Francisco, CA, August IEEE Computer Society
-
F. Zhang and J. Hellerstein. An Approach to On-Line Predictive Detection. In Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, pages 549-556, San Francisco, CA, August 2000. IEEE Computer Society.
-
(2000)
Proceedings of the Eighth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 549-556
-
-
Zhang, F.1
Hellerstein, J.2
|