-
1
-
-
12344297643
-
The inverse optimal value problem
-
Ahmed, S., Y. Guan. 2005. The inverse optimal value problem. Math. Programming 102(1) 91-110.
-
(2005)
Math. Programming
, vol.102
, Issue.1
, pp. 91-110
-
-
Ahmed, S.1
Guan, Y.2
-
2
-
-
0020752471
-
Jointly constrained biconvex programming
-
Al-Khayyal, F. A., J. E. Falk. 1983. Jointly constrained biconvex programming. Math. Oper. Res. 8(2) 273-286.
-
(1983)
Math. Oper. Res
, vol.8
, Issue.2
, pp. 273-286
-
-
Al-Khayyal, F.A.1
Falk, J.E.2
-
4
-
-
33646896924
-
-
Autonomic-computing approach to secure knowledge management: A game-theoretic analysis. 7EEE Trans, 487-497
-
Arora, H., B. K. Mishra, T. S. Raghu. 2006. Autonomic-computing approach to secure knowledge management: A game-theoretic analysis. 7EEE Trans. Systems, Man, Cybernetics-Part A: Systems Humans 36(3) 487-497.
-
(2006)
Systems Humans
, vol.36
, Issue.3
-
-
Arora, H.1
Mishra, B.K.2
Raghu, T.S.3
-
5
-
-
61349153099
-
Information assurance through defense in depth
-
3-7
-
Ashley, B. K., G, L. Jackson, 1999. Information assurance through defense in depth. IAnewsletter 3(2) 3-7.
-
(1999)
IAnewsletter
, vol.3
, Issue.2
-
-
Ashley, B.K.G.1
Jackson, L.2
-
6
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inform. System Security 3(3) 186-205.
-
(2000)
ACM Trans. Inform. System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
7
-
-
0003907293
-
-
Macmillan Technical Publishing, Indianapolis
-
Bace, R. G. 2000. Intrusion Detection. Macmillan Technical Publishing, Indianapolis.
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
9
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu, H., S. Raghunathan. 2004. Configuration of detection software: A comparison of decision and game theory approaches. Decision Anal. 1(3) 131-148.
-
(2004)
Decision Anal
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
10
-
-
18944385964
-
The value of intrusion detection systems in information technology architecture
-
Cavusoglu, H., B. Mishra, S. Raghunathan. 2005. The value of intrusion detection systems in information technology architecture. Inform. Systems Res. 16(1) 28-46.
-
(2005)
Inform. Systems Res
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
11
-
-
0035703699
-
When virtual is better than real
-
Germany, IEEE CS Press, Los Alamitos, CA
-
Chen, P. M., B. D. Noble. 2001. When virtual is better than real. Proc. 8th Workshop on Hot Topics in Operating Systems, Elmau, Germany, IEEE CS Press, Los Alamitos, CA, 133-138.
-
(2001)
Proc. 8th Workshop on Hot Topics in Operating Systems, Elmau
, pp. 133-138
-
-
Chen, P.M.1
Noble, B.D.2
-
13
-
-
0023294428
-
An intrusion-detection model
-
Denning, D. E. 1987. An intrusion-detection model. IEEE Trans. Software Engrg. 13(2) 222-232.
-
(1987)
IEEE Trans. Software Engrg
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
14
-
-
61349143773
-
-
De Shon, M. 2002. Intrusion prevention versus intrusion detection. White paper, SecureWorks, Inc., Atlanta, http://www.netbankaudit.com/images/IPSvsIDS- White- Paper.pdf.
-
De Shon, M. 2002. Intrusion prevention versus intrusion detection. White paper, SecureWorks, Inc., Atlanta, http://www.netbankaudit.com/images/IPSvsIDS- White- Paper.pdf.
-
-
-
-
15
-
-
7544225357
-
-
McGraw-Hill/Osborne, Emeryville, CA
-
Endorf, C., E. Schultz, J. Mellander. 2004. Intrusion Detection & Prevention. McGraw-Hill/Osborne, Emeryville, CA.
-
(2004)
Intrusion Detection & Prevention
-
-
Endorf, C.1
Schultz, E.2
Mellander, J.3
-
16
-
-
0002854108
-
Quadratic optimization
-
Kluwer, Dordrecht, The Netherlands
-
Floudas, C. A., V. Visweswaran. 1995. Quadratic optimization. Handbook of Global Optimization. Kluwer, Dordrecht, The Netherlands, 217-269.
-
(1995)
Handbook of Global Optimization
, pp. 217-269
-
-
Floudas, C.A.1
Visweswaran, V.2
-
17
-
-
0034827684
-
Evaluation of intrusion detectors: A decision theory approach
-
Oakland, CA
-
Gaffney, J. E., J. W. Ulvila. 2001. Evaluation of intrusion detectors: A decision theory approach. Proc. IEEE Sympos. Security Privacy, Oakland, CA, 50-61.
-
(2001)
Proc. IEEE Sympos. Security Privacy
, pp. 50-61
-
-
Gaffney, J.E.1
Ulvila, J.W.2
-
18
-
-
0040226707
-
A cutting plane algorithm for solving bilinear programs
-
Konno, H. 1976. A cutting plane algorithm for solving bilinear programs. Math. Programming 11 14-27.
-
(1976)
Math. Programming
, vol.11
, pp. 14-27
-
-
Konno, H.1
-
19
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, TX, USENIX, Berkeley, CA
-
Lee, W., S. J. Stolfo. 1998. Data mining approaches for intrusion detection. Proc. 7th USENIX Security Sympos., San Antonio, TX, USENIX, Berkeley, CA, 79-94.
-
(1998)
Proc. 7th USENIX Security Sympos
, pp. 79-94
-
-
Lee, W.1
Stolfo, S.J.2
-
20
-
-
0002774999
-
Learning patterns from UNIX process execution traces for intrusion detection
-
RI, Association for the Advancement of Artificial Intelligence, Menlo Park, CA
-
Lee, W., S. J. Stolfo, P. K. Chan. 1997. Learning patterns from UNIX process execution traces for intrusion detection. Proc. AAAI97 Workshop on AI Approaches to Fraud Detection and Risk Management, Providence, RI, Association for the Advancement of Artificial Intelligence, Menlo Park, CA, 50-56.
-
(1997)
Proc. AAAI97 Workshop on AI Approaches to Fraud Detection and Risk Management, Providence
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
-
21
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee, W., W. Fan, M. Miller, S. J. Stolfo, E. Zadok. 2002. Toward cost-sensitive modeling for intrusion detection and response. J. Comput. Security 10(1/2) 5-22.
-
(2002)
J. Comput. Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
22
-
-
61349154331
-
-
Lippmann, R. P., R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, M. A. Zissman. 1999. Results of the
-
Lippmann, R. P., R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, M. A. Zissman. 1999. Results of the
-
-
-
-
23
-
-
61349112167
-
-
DARPA 1998 off-line intrusion detection evaluation. Proc. 2nd Internal. Workshop on the Recent Adv. Intrusion Detection (RAID 99), West Lafayette, IN, http://www.raid-symposium.org/raid99/PAPERS/Lippmann-DARPA.pdf.
-
DARPA 1998 off-line intrusion detection evaluation. Proc. 2nd Internal. Workshop on the Recent Adv. Intrusion Detection (RAID 99), West Lafayette, IN, http://www.raid-symposium.org/raid99/PAPERS/Lippmann-DARPA.pdf.
-
-
-
-
24
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems. 7EEE
-
McHugh, J., A. Christie, J. Allen. 2000. Defending yourself: The role of intrusion detection systems. 7EEE Software 17(5) 42-51.
-
(2000)
Software
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
25
-
-
0003612091
-
-
Michie, D, D. J. Spiegelhalter, C. C. Tayor, eds, Ellis Horwood, London
-
Michie, D., D. J. Spiegelhalter, C. C. Tayor, eds. 1994. Machine Learning, Neural and Statistical Classification. Ellis Horwood, London.
-
(1994)
Machine Learning, Neural and Statistical Classification
-
-
-
26
-
-
61349172012
-
-
Nitro Data Systems, Inc. 2004. Intrusion prevention. White paper, Nitro Data Systems, Inc., Portsmouth, NH, http://www.securitytechnet.com/resource/ security/ids/NGDB.pdf.
-
Nitro Data Systems, Inc. 2004. Intrusion prevention. White paper, Nitro Data Systems, Inc., Portsmouth, NH, http://www.securitytechnet.com/resource/ security/ids/NGDB.pdf.
-
-
-
-
27
-
-
84862773644
-
-
Okena, Inc, San Jose, CA
-
Okena, Inc. 2003. A new approach to intrusion detection: Intrusion prevention. White paper, Okena, Inc. (Cisco, Inc.), San Jose, CA, http://www.securitytechnet.com/resource/security/ids/IDSWhitePaper.pdf.
-
(2003)
A new approach to intrusion detection: Intrusion prevention. White paper, Okena, Inc. (Cisco, Inc.)
-
-
-
29
-
-
0036848331
-
Stopping intruders outside the gates
-
Paulson, L. D. 2002. Stopping intruders outside the gates. Computer 35(11) 20-22.
-
(2002)
Computer
, vol.35
, Issue.11
, pp. 20-22
-
-
Paulson, L.D.1
-
30
-
-
84862759407
-
Intrusion detection⋯ or prevention?
-
Piscitello, D. 2002. Intrusion detection⋯ or prevention? Bus. Comm. Rev. 42-45.
-
(2002)
Bus. Comm. Rev
, pp. 42-45
-
-
Piscitello, D.1
-
31
-
-
61349106038
-
Erecting barriers
-
Robb, D. 2005. Erecting barriers. Computer-world 39(12) 42-44.
-
(2005)
Computer-world
, vol.39
, Issue.12
, pp. 42-44
-
-
Robb, D.1
-
32
-
-
61349103814
-
Recommended security controls for federal information systems
-
U.S. Department of Commerce, Washington, D.C
-
Ross, R., S. Katzke, A. Johnson, M. Swanson, G. Stoneburner, G. Rogers, A. Lee. 2005. Recommended security controls for federal information systems. Special Publication 800-53, National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Washington, D.C.
-
(2005)
Special Publication 800-53, National Institute of Standards and Technology (NIST), Technology Administration
-
-
Ross, R.1
Katzke, S.2
Johnson, A.3
Swanson, M.4
Stoneburner, G.5
Rogers, G.6
Lee, A.7
-
33
-
-
33645141316
-
Intrusion prevention systems: Security's silver bullet?
-
Sequeira, D. 2003. Intrusion prevention systems: Security's silver bullet? Bus. Comm. Rev. 33 36-41.
-
(2003)
Bus. Comm. Rev
, vol.33
, pp. 36-41
-
-
Sequeira, D.1
-
34
-
-
85012240666
-
Data mining- based intrusion detectors: An overview of the Columbia IDS project
-
Stolfo, S. J., W. Lee, P. K. Chan, W. Fan, E. Eskin. 2001. Data mining- based intrusion detectors: An overview of the Columbia IDS project. SIGMOD Record 30(4) 5-14.
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 5-14
-
-
Stolfo, S.J.1
Lee, W.2
Chan, P.K.3
Fan, W.4
Eskin, E.5
-
35
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Ulvila, J. W., J. E. Gaffney. 2004. A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1(1) 35-50.
-
(2004)
Decision Anal
, vol.1
, Issue.1
, pp. 35-50
-
-
Ulvila, J.W.1
Gaffney, J.E.2
-
36
-
-
0003636516
-
-
U.S. Joint Chiefs of Staff, Special publication, U.S. Government Printing Office, Washington, D.C
-
U.S. Joint Chiefs of Staff. 2000. Information assurance through defense in depth. Special publication, U.S. Government Printing Office, Washington, D.C.
-
(2000)
Information assurance through defense in depth
-
-
-
37
-
-
84905738826
-
Intrusion prevention systems (IPS)
-
The NSS Group, Ltd, Des Plaines, IL
-
Walder, B. 2004. Intrusion prevention systems (IPS). White paper, The NSS Group, Ltd., Des Plaines, IL, http://www.nss.co.uk/WhitePapers/intrusion- prevention-systems.htm.
-
(2004)
White paper
-
-
Walder, B.1
-
38
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, CA
-
Warrender, C., S. Forrest, B. Pearlmutter. 1999. Detecting intrusions using system calls: Alternative data models. Proc. 1999 IEEE Sympos. Security Privacy, Oakland, CA, 133-145.
-
(1999)
Proc. 1999 IEEE Sympos. Security Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|