-
1
-
-
54049120458
-
-
J. P. Anderson (1980). Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania.
-
J. P. Anderson (1980). "Computer security threat monitoring and surveillance". Technical report, James P. Anderson Company, Fort Washington, Pennsylvania.
-
-
-
-
2
-
-
0001214789
-
A Methodology for Testing Intrusion Detection Systems
-
N. Puketza, K. Zhang, R.A. Olsson, B. Mukherjee, and M. Chung (1996). "A Methodology for Testing Intrusion Detection Systems". IEEE Transactions on Software Engineering, Vol. 22, No. 10, pp. 719-729.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.1
Zhang, K.2
Olsson, R.A.3
Mukherjee, B.4
Chung, M.5
-
3
-
-
3643079262
-
A Software Platform for Testing Intrusion Detection Systems
-
Puketza N., Chung M., Olsson R. O., and Mukherjee B. (1997). "A Software Platform for Testing Intrusion Detection Systems". IEEE Software, Vol. 14, No. 5, pp. 43-51.
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 43-51
-
-
Puketza, N.1
Chung, M.2
Olsson, R.O.3
Mukherjee, B.4
-
4
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst R, Champion T, Witten B, et al (1999). "Testing and evaluating computer intrusion detection systems". Communications of the ACM, Vol. 42, No. 7, pp. 53-61.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
-
5
-
-
38949148591
-
Study on Evaluation Techniques of Intrusion Detection Systems
-
in Chinese
-
Dong Xiao-mei, Xiao Ke, Yu Ge (2005). "Study on Evaluation Techniques of Intrusion Detection Systems". Mini-Micro Systems, Vol. 26, No. 4, pp. 568-571 (in Chinese).
-
(2005)
Mini-Micro Systems
, vol.26
, Issue.4
, pp. 568-571
-
-
Dong, X.-M.1
Ke, X.2
Ge, Y.3
-
6
-
-
33745271417
-
Design and realization of evaluation environment for intrusion detection system
-
in Chinese
-
Cai Zhong-min, Sun Guo-ji, Wei Jun-hu, et al (2002). "Design and realization of evaluation environment for intrusion detection system". Journal of System Simulation, Vol. 14, No. 3, pp. 377-380 (in Chinese).
-
(2002)
Journal of System Simulation
, vol.14
, Issue.3
, pp. 377-380
-
-
Cai, Z.-M.1
Sun, G.-J.2
Wei, J.-H.3
-
8
-
-
0034301517
-
The 1999 DARPA Off-Line intrusion detection evaluation
-
Lippmann R, Haines J, Fried D et al (2000). "The 1999 DARPA Off-Line intrusion detection evaluation". Computer Networks, Vol. 34, No. 4, pp. 579-595.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
-
10
-
-
2942680824
-
Results of DARPA 1998 off-line intrusion detection evaluation
-
Presented at December
-
I. Graf, R. Lippmann, R. Cunningham, K. K. D. Fried, S. Webster, and M. Zissman. Results of DARPA 1998 off-line intrusion detection evaluation. Presented at DARPA PI Meeting, 15 December 1998.
-
(1998)
DARPA PI Meeting, 15
-
-
Graf, I.1
Lippmann, R.2
Cunningham, R.3
Fried, K.K.D.4
Webster, S.5
Zissman, M.6
-
11
-
-
33646857044
-
-
Boping Qin, Xianwei zhou, Jun yang et al (2006). Comprehensive Evaluation of Intrusion Detection Systems Based on Fuzzy Methods. Computer Engineering, 32, No. 8, pp. 155-156 (in Chinese)
-
Boping Qin, Xianwei zhou, Jun yang et al (2006). "Comprehensive Evaluation of Intrusion Detection Systems Based on Fuzzy Methods". Computer Engineering, Vol. 32, No. 8, pp. 155-156 (in Chinese)
-
-
-
-
16
-
-
33750264822
-
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
-
Hamburg, Germany, September 18-20
-
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee and Boris Skoric (2006). "Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems". 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Vol. 4189, pp. 527-546.
-
(2006)
11th European Symposium on Research in Computer Security
, vol.4189
, pp. 527-546
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
17
-
-
34247332710
-
Measuring intrusion detection capability: An information-theoretic approach
-
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee and Boris Skoric (2006). "Measuring intrusion detection capability: an information-theoretic approach". In Proceedings of the 2006 ACM Symposium on information, Computer and Communications Security, pp. 90-101.
-
(2006)
Proceedings of the 2006 ACM Symposium on information, Computer and Communications Security
, pp. 90-101
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
|