-
1
-
-
70350701614
-
-
Snort IDS Website (1998-2009), http://www.snort.org/
-
Snort IDS Website (1998-2009), http://www.snort.org/
-
-
-
-
2
-
-
70350701615
-
-
Samhain IDS Website (2001-2009), http://www.la-samhna.de/samhain/
-
Samhain IDS Website (2001-2009), http://www.la-samhna.de/samhain/
-
-
-
-
3
-
-
70350682931
-
-
Bro IDS Website (2003-2009), http://www.bro-ids.org/
-
Bro IDS Website (2003-2009), http://www.bro-ids.org/
-
-
-
-
4
-
-
70350663769
-
-
F-Secure Linux Security Website F-Secure Corporation
-
F-Secure Linux Security Website F-Secure Corporation (2006-2009), http://www.f-secure.com/linux-weblog/
-
(2006)
-
-
-
5
-
-
70350693176
-
-
Prelude IDS Website
-
Prelude IDS Website: PreludeIDS Technologies (2005-2009), http://www.prelude-ids.com/
-
(2005)
PreludeIDS Technologies
-
-
-
6
-
-
27144432843
-
Detecting malicious javascript code in mozilla
-
Washington, DC, USA, pp
-
Hallaraker, O., Vigna, G.: Detecting malicious javascript code in mozilla. In: Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2005, Washington, DC, USA, pp. 85-94 (2005)
-
(2005)
Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS
, pp. 85-94
-
-
Hallaraker, O.1
Vigna, G.2
-
7
-
-
35248857893
-
-
Mahoney, M.V., Chan, P.K.: An analysis of the 1999 dARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 220-237. Springer, Heidelberg (2003)
-
Mahoney, M.V., Chan, P.K.: An analysis of the 1999 dARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 220-237. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
35248842651
-
-
Ramadas, M., Ostermann, S., Tjaden, B.C.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 36-54. Springer, Heidelberg (2003)
-
Ramadas, M., Ostermann, S., Tjaden, B.C.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 36-54. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
33751056900
-
-
Brumley, D., Newsome, J., Song, D., et al.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of the, IEEE Symposium on Security and Privacy, SP 2006, Washington, DC, USA, pp. 2-16 (2006)
-
Brumley, D., Newsome, J., Song, D., et al.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of the, IEEE Symposium on Security and Privacy, SP 2006, Washington, DC, USA, pp. 2-16 (2006)
-
-
-
-
11
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Australia, pp
-
Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the 28th Australasian conference on Computer Science, ACSC 2005, Darlinghurst, Australia, pp. 333-342 (2005)
-
(2005)
Proceedings of the 28th Australasian conference on Computer Science, ACSC 2005, Darlinghurst
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
12
-
-
0004225165
-
The Intrusion Detection Message Exchange Format, Internet Draft
-
Technical Report, IETF Intrusion Detection Exchange Format Working Group July
-
Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format, Internet Draft. Technical Report, IETF Intrusion Detection Exchange Format Working Group (July 2004)
-
(2004)
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
13
-
-
38049149484
-
Research on the Lock-Keeper Technology: Architectures, Applications and Advancements
-
Cheng, F., Meinel, C.: Research on the Lock-Keeper Technology: Architectures, Applications and Advancements. International Journal of Computer and Information Science 5(3), 236-245 (2004)
-
(2004)
International Journal of Computer and Information Science
, vol.5
, Issue.3
, pp. 236-245
-
-
Cheng, F.1
Meinel, C.2
-
14
-
-
70350693062
-
-
Lock-Keeper Website (2003-2009), http://www.lock-keeper.org/
-
(2003)
Website
-
-
-
15
-
-
77954338203
-
-
Cheng, F., Meinel, C.: Lock-Keeper: A new implementation of physical separation technology. In: Paulus, S., Pohlmann, N., Reimer, H. (eds.) Securing Electronic Business Processes: Highligths of the Information Security Solutions Europe Conference, ISSE 2006, pp. 275-286. Friedrich Vieweg & Sohn Verlag (2006)
-
Cheng, F., Meinel, C.: Lock-Keeper: A new implementation of physical separation technology. In: Paulus, S., Pohlmann, N., Reimer, H. (eds.) Securing Electronic Business Processes: Highligths of the Information Security Solutions Europe Conference, ISSE 2006, pp. 275-286. Friedrich Vieweg & Sohn Verlag (2006)
-
-
-
-
16
-
-
34250737826
-
Management and integration of information in intrusion detection system: Data integration system for IDS based multi-agent systems
-
Washington, DC, USA, pp
-
Claudino, E.C., Abdelouahab, Z., Teixeira, M.M.: Management and integration of information in intrusion detection system: Data integration system for IDS based multi-agent systems. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, WI-IATW 2006, Washington, DC, USA, pp. 49-52 (2006)
-
(2006)
Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, WI-IATW
, pp. 49-52
-
-
Claudino, E.C.1
Abdelouahab, Z.2
Teixeira, M.M.3
-
17
-
-
34248347086
-
Investigating new approaches to data collection, management and analysis for network intrusion detection
-
New York, USA, pp
-
Derrick, E.J., Tibbs, R.W., Reynolds, L.L.: Investigating new approaches to data collection, management and analysis for network intrusion detection. In: Proceedings of the 45th Annual Southeast Regional Conference, SE 2007, New York, USA, pp. 283-287 (2007)
-
(2007)
Proceedings of the 45th Annual Southeast Regional Conference, SE
, pp. 283-287
-
-
Derrick, E.J.1
Tibbs, R.W.2
Reynolds, L.L.3
-
18
-
-
34748814488
-
Evaluation of a decentralized architecture for large scale collaborative intrusion detection
-
Munich, Germany, pp
-
Zhou, C.V., Karunasekera, S., Leckie, C.: Evaluation of a decentralized architecture for large scale collaborative intrusion detection. In: Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management, IM 2007, Munich, Germany, pp. 80-89 (2007)
-
(2007)
Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management, IM
, pp. 80-89
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
-
19
-
-
10444242731
-
TRINETR: An intrusion detection alert management system
-
Washington, DC, USA, pp
-
Yu, J., Reddy, Y.V.R., Selliah, S., et al.: TRINETR: An intrusion detection alert management system. In: Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2004, Washington, DC, USA, pp. 235-240 (2004)
-
(2004)
Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
, pp. 235-240
-
-
Yu, J.1
Reddy, Y.V.R.2
Selliah, S.3
-
20
-
-
70350701613
-
-
Intelligent Application Gateway (IAG) Website
-
Intelligent Application Gateway (IAG) Website: Microsoft Corporation (2006- 2009), http://www.microsoft.com/iag/
-
(2006)
-
-
-
21
-
-
0027719713
-
A pump for rapid, reliable, secure communication
-
New York, USA, pp
-
Kang, M.H., Moskowitz, I.S.: A pump for rapid, reliable, secure communication. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993, New York, USA, pp. 119-129 (1993)
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS
, pp. 119-129
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
23
-
-
70350689106
-
-
Nmap Security Scanner Website (1997-2008), http://www.nmap.org/
-
Nmap Security Scanner Website (1997-2008), http://www.nmap.org/
-
-
-
-
24
-
-
33745205813
-
Inferring internet denial-of-service activity
-
Moore, D., Shannon, C., Brown, D.J., et al.: Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS) 24(2), 115-139 (2006)
-
(2006)
ACM Transactions on Computer Systems (TOCS)
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
|