-
2
-
-
57849113476
-
-
CERT/CC, code red' worm exploiting buffer overflow in iis indexing service dll, CERT Advisory CA-2001-19, January 17, 2002. [Online]. Available: http://www.cert.org/advisories/CA-2001-19.html
-
CERT/CC, "code red'" worm exploiting buffer overflow in iis indexing service dll", CERT Advisory CA-2001-19, January 17, 2002. [Online]. Available: http://www.cert.org/advisories/CA-2001-19.html
-
-
-
-
3
-
-
57849120209
-
-
-, Apache/mod-ssl worm, CERT Advisory CA-2002-27, October 11, 2002. [Online]. Available: http://www.cert.org/advisories/CA-2002-27.html
-
-, "Apache/mod-ssl worm", CERT Advisory CA-2002-27, October 11, 2002. [Online]. Available: http://www.cert.org/advisories/CA-2002-27.html
-
-
-
-
4
-
-
85180737978
-
A lightweight tool for detecting web server attacks
-
M. Almgren, H. Debar, and M. Dacier, "A lightweight tool for detecting web server attacks", in NDSS, 2000.
-
(2000)
NDSS
-
-
Almgren, M.1
Debar, H.2
Dacier, M.3
-
6
-
-
62349108537
-
A stateful intrusion detection system for world-wide web servers
-
G. Vigna, W. K. Robertson, Y. Kher, and R. A. Kemmerer, "A stateful intrusion detection system for world-wide web servers", in ACSAC, 2003, pp. 34-45.
-
(2003)
ACSAC
, pp. 34-45
-
-
Vigna, G.1
Robertson, W.K.2
Kher, Y.3
Kemmerer, R.A.4
-
7
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch, "Snort: Lightweight intrusion detection for networks", in USA, 1999, pp. 229-23S.
-
(1999)
USA
-
-
Roesch, M.1
-
8
-
-
77954580806
-
Web attack detection using id3
-
V. H. García, R. Monroy, and M. Quintana, "Web attack detection using id3", in IFIP PPAI, 2006, pp. 323-332.
-
(2006)
IFIP PPAI
, pp. 323-332
-
-
García, V.H.1
Monroy, R.2
Quintana, M.3
-
9
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
C. Krügel, G. Vigna, and W. K. Robertson, "A multi-model approach to the detection of web-based attacks", Computer Networks, vol. 48, no. 5, pp. 717-738, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Krügel, C.1
Vigna, G.2
Robertson, W.K.3
-
10
-
-
24144447453
-
-
Publishing House of Electronics Industry Beijing
-
T. Li, Computer Immunology. Publishing House of Electronics Industry Beijing, 2004.
-
(2004)
Computer Immunology
-
-
Li, T.1
-
11
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
F. A. González and D. Dasgupta, "An immunity-based technique to characterize intrusions in computer networks", IEEE Trans. Evolutionary Computation, vol. 6, no. 3, pp. 281-291, 2002.
-
(2002)
IEEE Trans. Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
González, F.A.1
Dasgupta, D.2
-
12
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
P. D'haeseleer, S. Forrest, and P. Helman, "An immunological approach to change detection: Algorithms, analysis and implications", in IEEE Symposium on Security and Privacy, 1996, pp. 110-119.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 110-119
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
13
-
-
30644478743
-
Data reduction in intrusion alert correlation
-
T. Gianni and A. Uwe, "Data reduction in intrusion alert correlation", WSEAS Transactions on Computers, vol. 5(1), pp. 186-193, 2006.
-
(2006)
WSEAS Transactions on Computers
, vol.5
, Issue.1
, pp. 186-193
-
-
Gianni, T.1
Uwe, A.2
-
14
-
-
33750231629
-
Applicability issues of the real-valued negative selection algorithms
-
Z. Ji and D. Dasgupta, "Applicability issues of the real-valued negative selection algorithms", in GECCO, 2006, pp. 111-118.
-
(2006)
GECCO
, pp. 111-118
-
-
Ji, Z.1
Dasgupta, D.2
-
15
-
-
0015956495
-
Towards a network theory of the immune system
-
N. K. Jerne, "Towards a network theory of the immune system", Annnual Immunology, vol. 125C(1-2), pp. 373-89, 1974.
-
(1974)
Annnual Immunology
, vol.125 C
, Issue.1-2
, pp. 373-389
-
-
Jerne, N.K.1
-
16
-
-
0016572913
-
A vector space model for automatic indexing
-
G. Salton, A. Wong, and C. S. Yang, "A vector space model for automatic indexing", Commun. ACM, vol. 18, no. 11, pp. 613-620, 1975.
-
(1975)
Commun. ACM
, vol.18
, Issue.11
, pp. 613-620
-
-
Salton, G.1
Wong, A.2
Yang, C.S.3
|