-
1
-
-
18944381640
-
Intrusion detection fly-off: Implications for the United States Navy
-
97W096, MITRE, McLean, VA
-
Aguirre, S. J., W. H. Hill. 1997. Intrusion detection fly-off: Implications for the United States Navy. MITRE Technical Report MTR 97W096, MITRE, McLean, VA.
-
(1997)
MITRE Technical Report MTR
-
-
Aguirre, S.J.1
Hill, W.H.2
-
2
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axellson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inform. System Security 3 186-205.
-
(2000)
ACM Trans. Inform. System Security
, vol.3
, pp. 186-205
-
-
Axellson, S.1
-
3
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu, H., S. Raghunathan. 2004. Configuration of detection software: A comparison of decision and game theory approaches. Decision Anal. 1 131-148.
-
(2004)
Decision Anal
, vol.1
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
4
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reaction for breached firms and internet security developers
-
Cavusoglu, H., B. Mishra, S. Raghunathan. 2004. The effect of internet security breach announcements on market value: Capital market reaction for breached firms and internet security developers. Intermit. J Electronic Commerce 9 69-105.
-
(2004)
Intermit. J Electronic Commerce
, vol.9
, pp. 69-105
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
5
-
-
18944385964
-
The value of intrusion detection systems (IDSs) in information technology (IT) security
-
Cavusoglu, H., B. Mishra, S. Raghunathan. 2005. The value of intrusion detection systems (IDSs) in information technology (IT) security. Inform. Systems Res. 16 28-46.
-
(2005)
Inform. Systems Res
, vol.16
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
6
-
-
0023294428
-
An intrusion detection model
-
Denning, D. E, 1987, An intrusion detection model. IEEE Trans. Software Engrg. 13 222-232.
-
(1987)
IEEE Trans. Software Engrg
, vol.13
, pp. 222-232
-
-
Denning, D.E.1
-
7
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
IEEE Press, New York
-
D'haeseleer, P., S. Forrest, P. Helman. 1996. An immunological approach to change detection: Algorithms, analysis, and implications. IEEE Sympos. Security and Privacy. IEEE Press, New York.
-
(1996)
IEEE Sympos. Security and Privacy
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
8
-
-
0020096117
-
Minimax policies for unobscrvable inspections
-
Diamond, H. 1982. Minimax policies for unobscrvable inspections. Math. Oper. Res. 7 139-153.
-
(1982)
Math. Oper. Res
, vol.7
, pp. 139-153
-
-
Diamond, H.1
-
9
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst, R., T. Champion, B. Witten, E. Miller, L. Spagnuolo. 1999. Testing and evaluating computer intrusion detection systems. Comm. ACM 42 53-61.
-
(1999)
Comm. ACM
, vol.42
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
11
-
-
58149098904
-
-
Gartner, Hype cycle for information security, Gartner, Stamford, CT
-
Gartner. 2003. Hype cycle for information security. Gartner Research Report, Gartner, Stamford, CT.
-
(2003)
Gartner Research Report
-
-
-
12
-
-
0038223766
-
Using information security as a response to competitor analysis systems
-
Gordon, L. A., M. P. Loeb. 2001. Using information security as a response to competitor analysis systems. Comm. ACM 44 70-75.
-
(2001)
Comm. ACM
, vol.44
, pp. 70-75
-
-
Gordon, L.A.1
Loeb, M.P.2
-
14
-
-
2342646110
-
The effect of intrusion detection management methods on the return on investment
-
Iheagwara, C. 2004. The effect of intrusion detection management methods on the return on investment. Comput. Security 23 213-228.
-
(2004)
Comput. Security
, vol.23
, pp. 213-228
-
-
Iheagwara, C.1
-
15
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson, E., T. Olovsson. 1997. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Engrg. 23 235-245.
-
(1997)
IEEE Trans. Software Engrg
, vol.23
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
16
-
-
34548807057
-
A pattern matching model for misuse intrusion detection
-
Purdue University, West Lafayette, IN
-
Kumar, S., E. Spafford. 1996. A pattern matching model for misuse intrusion detection. The COAST Project. Purdue University, West Lafayette, IN.
-
(1996)
The COAST Project
-
-
Kumar, S.1
Spafford, E.2
-
17
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee, W, W. Fan, M. Miller, S. Stolfo, E. Zadok. 2001. Toward cost-sensitive modeling for intrusion detection and response. J. Comput. Security 10 5-22.
-
(2001)
J. Comput. Security
, vol.10
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.4
Zadok, E.5
-
18
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
IEEE Press, Los Alamitos, CA
-
Lippmann, R. P., D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, S. E. Weber, D. Webster, R. K. Wyschogrod, R. K. Cunningham, M. A. Zissman. 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. Proc. 2000 DARPA Inform. Survivability Conf. Exposition, IEEE Press, Los Alamitos, CA, 12-26.
-
(2000)
Proc. 2000 DARPA Inform. Survivability Conf. Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, S.E.7
Webster, D.8
Wyschogrod, R.K.9
Cunningham, R.K.10
Zissman, M.A.11
-
19
-
-
0027609384
-
A survey of intrusion detection systems
-
Lunt, T. 1993, A survey of intrusion detection systems. Comput. Security 12 405-418.
-
(1993)
Comput. Security
, vol.12
, pp. 405-418
-
-
Lunt, T.1
-
20
-
-
61349156589
-
-
Moitra, S., S. Konda. 2000. A simulation model for managing survivability of networked information systems. Technical Report, Carnegie Mellon Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
Moitra, S., S. Konda. 2000. A simulation model for managing survivability of networked information systems. Technical Report, Carnegie Mellon Software Engineering Institute, Carnegie Mellon University, Pittsburgh.
-
-
-
-
22
-
-
3543064959
-
-
NSS Group, 2nd ed. Oakwood House, Wennington, Cambridgeshire, UK
-
NSS Group. 2001. Intrusion Detection Systems Group Test, 2nd ed. Oakwood House, Wennington, Cambridgeshire, UK.
-
(2001)
Intrusion Detection Systems Group Test
-
-
-
23
-
-
0026122870
-
Optimal scheduling of inspections: A delayed Markov model with false positives and negatives
-
Ozekici, S., S. Pliska. 1991. Optimal scheduling of inspections: A delayed Markov model with false positives and negatives. Oper. Res. 39 261-273.
-
(1991)
Oper. Res
, vol.39
, pp. 261-273
-
-
Ozekici, S.1
Pliska, S.2
-
24
-
-
84873309550
-
Penetration state transition analysis: A rule based intrusion detection approach
-
IEEE Press, Los Alamitos, CA
-
Porras, P., R. Kemmerer. 1992. Penetration state transition analysis: A rule based intrusion detection approach. IEEE Eighth Annual Comput. Security Appl. Conf., IEEE Press, Los Alamitos, CA, 220-229.
-
(1992)
IEEE Eighth Annual Comput. Security Appl. Conf
, pp. 220-229
-
-
Porras, P.1
Kemmerer, R.2
-
25
-
-
0002629036
-
Emerald: Event monitoring enabling responses to anomalous live disturbances
-
National Institute of Standards and Technology, Baltimore
-
Porras, P., P. Neumann. 1997. Emerald: Event monitoring enabling responses to anomalous live disturbances. Proc. 20th National Inform. Systems Security Conf., National Institute of Standards and Technology, Baltimore, 353-365.
-
(1997)
Proc. 20th National Inform. Systems Security Conf
, pp. 353-365
-
-
Porras, P.1
Neumann, P.2
-
26
-
-
3643079262
-
A software platform for testing intrusion detection systems
-
Puketza, N., M. Chung, R. O. Olsson, B. Mukherjee. 1997. A software platform for testing intrusion detection systems. IEEE Software 14 43-51.
-
(1997)
IEEE Software
, vol.14
, pp. 43-51
-
-
Puketza, N.1
Chung, M.2
Olsson, R.O.3
Mukherjee, B.4
-
28
-
-
0003883721
-
Computer Security Basics
-
Associates, Inc, Sebastopol, CA
-
Russell, D., G. T. Gangemi. 1992. Computer Security Basics. O'Reilly amp; Associates, Inc., Sebastopol, CA.
-
(1992)
O'Reilly amp
-
-
Russell, D.1
Gangemi, G.T.2
-
29
-
-
1542386294
-
ISS realsecure pushes past newer IDS players
-
Shipley, G. 1999. ISS realsecure pushes past newer IDS players. Network Comput. 10 95-111.
-
(1999)
Network Comput
, vol.10
, pp. 95-111
-
-
Shipley, G.1
-
31
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Ulvila, J., J. Gaffney. 2004. A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1 35-50.
-
(2004)
Decision Anal
, vol.1
, pp. 35-50
-
-
Ulvila, J.1
Gaffney, J.2
-
32
-
-
0141632295
-
New directions for the AAPHID architecture
-
Purdue University, West Lafayette, IN
-
Zamboni, D., E. Spafford. 1999. New directions for the AAPHID architecture. Recent Advances in Intrusion Detection. Purdue University, West Lafayette, IN.
-
(1999)
Recent Advances in Intrusion Detection
-
-
Zamboni, D.1
Spafford, E.2
|