-
1
-
-
74849134951
-
-
Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD
-
Rhodes B, Mahaffey J, Cannady J. Multiple self-organizing maps for intrusion detection, Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD, 2000.
-
(2000)
Multiple Self-organizing Maps For Intrusion Detection
-
-
Rhodes, B.1
Mahaffey, J.2
Cannady, J.3
-
3
-
-
0034836394
-
-
Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May
-
Wagner D, Dean R. Intrusion detection via static analysis, Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.
-
(2001)
Intrusion Detection Via Static Analysis
-
-
Wagner, D.1
Dean, R.2
-
4
-
-
0038011179
-
-
In ACM Computer and Communication Security Conference (CCS), Washington DC, November 2002
-
Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, Zhou S. Specification-based anomaly detection: a new approach for detecting network intrusions, In ACM Computer and Communication Security Conference (CCS), Washington DC, November 2002.
-
Specification-based Anomaly Detection: A New Approach For Detecting Network Intrusions
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
5
-
-
74849095747
-
-
In Proceedings of the Sixth International Symposium, Recent Advances in Intrusion Detection (RAID'03), Pittsburg, PA
-
Balepin I, Maltsev S, Rowe J, Levitt K. Using specification-based intrusion detection for automated response, In Proceedings of the Sixth International Symposium, Recent Advances in Intrusion Detection (RAID'03), Pittsburg, PA, 2003.
-
(2003)
Using Specification-based Intrusion Detection For Automated Response
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.4
-
6
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
Depren O, Topallar M, Anarim E, Ciliz MK. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications 2005; 4(29): 713--722.
-
(2005)
Expert Systems With Applications
, vol.4
, Issue.29
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
7
-
-
0036079805
-
-
In Proceedings of the IEEE International Joint Conferenceon Neural Networks, Hawaii, May
-
Lichodzijewski P, Zincir-Heywood A, Heywood M. Host-based intrusion detection using self-organizing maps, In Proceedings of the IEEE International Joint Conferenceon Neural Networks, Hawaii, May 2002.
-
(2002)
Host-based Intrusion Detection Using Self-organizing Maps
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.2
Heywood, M.3
-
10
-
-
77956068498
-
-
Technology White Paper (Oct. 2007). Available
-
Khan N. The SIP servlet programming model, Technology White Paper (Oct. 2007). Available http://dev2dev.bea.com
-
The Sip Servlet Programming Model
-
-
Khan, N.1
-
11
-
-
4544342880
-
-
In Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04), Florence, Italy
-
Wu Y, Bagchi S, Garg S, Singh N, Tsai T. SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice- over-IP environments, In Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04), Florence, Italy, 2004.
-
(2004)
Scidive: A Stateful and Cross Protocol Intrusion Detection Architecture For Voice- Over-ip Environments
-
-
Wu, Y.1
Bagchi, S.2
Garg, S.3
Singh, N.4
Tsai, T.5
-
15
-
-
0007473204
-
An introduction to intrusion detection. ACM Crossroads Magazine
-
Sundaram A. An introduction to intrusion detection. ACM Crossroads Magazine, Special Issue on Computer Security 1996; 2(4): 3--7.
-
(1996)
Special Issue On Computer Security
, vol.2
, Issue.4
, pp. 3-7
-
-
Sundaram, A.1
-
16
-
-
20844442941
-
-
Wiley: Sussex
-
Poikselka M, Mayer G, Khartabil H, Niemi A. The IMS: IP Multimedia Concepts and Services in the Mobile Domain, Wiley: Sussex, 2004; 278.
-
(2004)
Ip Multimedia Concepts and Services In the Mobile Domain
, pp. 278
-
-
Poikselka, M.1
Mayer, G.2
Khartabil, H.3
Niemi, A.4
The, I.M.S.5
-
17
-
-
33845562254
-
-
In Proceedings of the International Conference on Dependable Systems and Networks (DSN'06), Philadelphia, USA
-
Sengar H, Wijesekera D, Wang H, Jajodia S. VoIP intrusion detection through interacting protocol state machines, In Proceedings of the International Conference on Dependable Systems and Networks (DSN'06), Philadelphia, USA, 2006.
-
(2006)
Voip Intrusion Detection Through Interacting Protocol State Machines
-
-
Sengar, H.1
Wijesekera, D.2
Wang, H.3
Jajodia, S.4
-
22
-
-
66149159142
-
-
Proceedings of The 2006 International Conference on Security and Management, Las Vegas, USA
-
Wasniowski RA. Network intrusion detection system with data mart, Proceedings of The 2006 International Conference on Security and Management, Las Vegas, USA, 2006.
-
(2006)
Network Intrusion Detection System With Data Mart
-
-
Wasniowski, R.A.1
-
24
-
-
0012249167
-
-
In Proceedings of Recent Advances in Intrusion Detection (RAID), Toulouse, France, October
-
Lippmann R, Haines JW, Fried DJ, Korba J, Das K. The 1999 DARPA off-line intrusion detection evaluation, In Proceedings of Recent Advances in Intrusion Detection (RAID), Toulouse, France, October 2000.
-
(2000)
The 1999 Darpa Off-line Intrusion Detection Evaluation
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
25
-
-
84947618665
-
-
OMNeT++ Simulator. Available
-
OMNeT++ Simulator. Available: http://www.omnetpp.org
-
-
-
-
28
-
-
0003657185
-
-
International Telecommunication Union---Telecommunication Standardization Section Recommendation G.114, Available
-
International Telecommunication Union---Telecommunication Standardization Section Recommendation G.114 (2003, May). One-way Transmission Time. Available: http://www.itu.int
-
(2003)
One-way Transmission Time
-
-
-
29
-
-
34047131416
-
-
Internet Engineering Task Force---Internet Draft, Available
-
Internet Engineering Task Force---Internet Draft (1999. June). VoIP Signaling Performance Requirements and Expectations. Available: http://tools.ietf.org
-
(1999)
Voip Signaling Performance Requirements and Expectations
-
-
-
30
-
-
0003451777
-
-
OT Final Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA, February
-
Lunt TF, Tamaru A, Gilham F, Jagannathan R, Jalali C, Neumann PG, Javitz HS, Valdes A, Garvey TD. A real-time intrusion detection expert system (IDES), OT Final Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA, February 1992.
-
(1992)
A Real-time Intrusion Detection Expert System (ides)
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalali, C.5
Neumann, P.G.6
Javitz, H.S.7
Valdes, A.8
Garvey, T.D.9
-
31
-
-
74849098536
-
-
Proceedings of the 14th National Computer Security Conference, Baltimore, MD, October
-
Jackson KA, DuBios DH, Stalling CA. An expert system application for network intrusion detection, Proceedings of the 14th National Computer Security Conference, Baltimore, MD, pp. 215--225, October 1991.
-
(1991)
An Expert System Application For Network Intrusion Detection
, pp. 215-225
-
-
Jackson, K.A.1
Dubios, D.H.2
Stalling, C.A.3
-
32
-
-
0024665277
-
-
Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA
-
Vaccaro HS, Liepins GE. Detection of anomalous computer session activity, Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 280--289, May 1989.
-
(1989)
Detection of Anomalous Computer Session Activity
, pp. 280-289
-
-
Vaccaro, H.S.1
Liepins, G.E.2
-
33
-
-
85019504940
-
-
In Proceedings of the 14th Annual Computer Security Application Conference (ACSAC), Scottsdale, Arizona
-
Vigna G, Kemmerer R. NetSTAT: a network-based intrusion detection approach, In Proceedings of the 14th Annual Computer Security Application Conference (ACSAC), Scottsdale, Arizona, 1998.
-
(1998)
Netstat: A Network-based Intrusion Detection Approach
-
-
Vigna, G.1
Kemmerer, R.2
-
34
-
-
74849096499
-
-
Proceedings of The Third International Symposium, Automated Technology for Verification and Analysis (ATVA), Taipei, Taiwan, October
-
Orset JM, Alcalde B, Cavalli A. An EFSM-based intrusion detection system for Ad Hoc networks, Proceedings of The Third International Symposium, Automated Technology for Verification and Analysis (ATVA), Taipei, Taiwan, October 2005.
-
(2005)
An Efsm-based Intrusion Detection System For Ad Hoc Networks
-
-
Orset, J.M.1
Alcalde, B.2
Cavalli, A.3
-
36
-
-
34250615390
-
-
Proceedings of IEEE Fourteenth International Workshop on Quality of Service, New Haven, CT
-
Sengar H, Wijesekera D, Wang H, Jajodia S. Fast Detection of Denial-of-Service Attacks on IP Telephony, Proceedings of IEEE Fourteenth International Workshop on Quality of Service, New Haven, CT, 2006.
-
(2006)
Fast Detection of Denial-of-service Attacks On Ip Telephony
-
-
Sengar, H.1
Wijesekera, D.2
Wang, H.3
Jajodia, S.4
|