-
1
-
-
17444401173
-
Extending the computer defense immune system: Network intrusion detection with a multi-objective evolutionary programming approach
-
K. P. Anchor, J. B. Zydallis, G. H. Gunsch, and G. B. Lamont, "Extending the computer defense immune system: Network intrusion detection with a multi-objective evolutionary programming approach," in ICARIS 2002: 1st International Conference on Artificial Immune Systems Conference Proceedings, pp. 12-21, 2002.
-
(2002)
in ICARIS 2002 1st International Conference on Artificial Immune Systems Conference Proceedings
, pp. 12-21
-
-
Anchor, K.P.1
Zydallis, J.B.2
Gunsch, G.H.3
Lamont, G.B.4
-
3
-
-
2942749266
-
BlueBox: A policy-driven, host-based intrusion detection system
-
May
-
S. N. Chari and P. Cheng, "BlueBox: A policy-driven, host-based intrusion detection system," ACM Transaction on Infomation and System Security, vol. 6, no. 2, pp. 173-200, May 2003.
-
(2003)
ACM Transaction on Infomation and System Securit
, vol.6
, Issue.2
, pp. 173-200
-
-
Chari, S.N.1
Cheng, P.2
-
4
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer net-works
-
D. Dasgupta and F. González, "An immunity-based technique to characterize intrusions in computer net-works," IEEE Transactions on Evol. Comput., vol. 6, no. 3, pp. 1081-1088, 2002.
-
(2002)
IEEE Transactions on Evol. Comput.
, vol.6
, Issue.3
, pp. 1081-1088
-
-
Dasgupta, D.1
González, F.2
-
5
-
-
0034226287
-
A revised taxonomy for intrusion detection systems
-
H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusion detection systems," Annales des Telecommunications, vol. 55, no. 7-8, pp. 361-378, 2000.
-
(2000)
Annales des Telecommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
6
-
-
0023294428
-
An intrusion detection model
-
Feb
-
D. E. Denning, "An intrusion detection model," IEEE Transaction on Software Engineering, vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Transaction on Software Engineering
, vol.SE13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
7
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
D Barbara and S. Jajodia (editors), Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," D. Barbara and S. Jajodia (editors), in em Applications of Data Mining in Computer Security, Kluwer, 2002.
-
(2002)
in em Applications of Data Mining in Computer Securit
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
8
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
9
-
-
0004118981
-
-
SRI Anual Report A010, SRI International, Computer Science Laboratory, March
-
H. Javits and A. Valdes, The NIDES Statistical Component: Description and Justification, SRI Anual Report A010, SRI International, Computer Science Laboratory, March 1993.
-
(1993)
The NIDES Statistical Component: Description and Justification
-
-
Javits, H.1
Valdes, A.2
-
10
-
-
0035616570
-
A hybrid high-order markov chain model for computer intrusion detection
-
W. Ju and Y. Vardi, "A hybrid high-order markov chain model for computer intrusion detection," Journal of Computational and Graphical Statistics, vol. 10, no. 2, pp. 277-295, 2001.
-
(2001)
Journal of Computational and Graphical Statistics
, vol.10
, Issue.2
, pp. 277-295
-
-
Ju, W.1
Vardi, Y.2
-
11
-
-
2942608134
-
-
Technical Report No. CUCS-002-00, Computer Science, Columbia University
-
W. Lee, M. Miller, and S. Stolfo, Toward Cost-sensitive Modeling for Intrusion Detection, Technical Report No. CUCS-002-00, Computer Science, Columbia University, 2000.
-
(2000)
Toward Cost-sensitive Modeling for Intrusion Detection
-
-
Lee, W.1
Miller, M.2
Stolfo, S.3
-
12
-
-
84885774862
-
A framework for contructing features and models for intrusion detection systems
-
Nov
-
W. Lee and S. J. Stolfo, "A framework for contructing features and models for intrusion detection sys-tems," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 227-261, Nov. 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
13
-
-
85084160262
-
Using text categorization techniques for intrusion detection
-
Aug. 2002
-
Y. Liao and V. R. Vemuri, "Using text categorization techniques for intrusion detection," in Usenix: Security 2002, pp. 51-59, Aug. 2002.
-
in Usenix: Security
, pp. 51-59
-
-
Liao, Y.1
Vemuri, V.R.2
-
14
-
-
19544375196
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
July 23-26
-
M. V. Mahoney and P. K. Chan, "Learning nonstationary models of normal network traffic for detecting novel attacks," in SIGKDD 2002, pp. 23-26, July 23-26 2002.
-
(2002)
in SIGKDD
, vol.2002
, pp. 23-26
-
-
Mahoney, M.V.1
Chan, P.K.2
-
15
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
Oct
-
C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach," IEEE Communications Magazine, vol. 40, no. 10, pp. 76-82, Oct. 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 7682
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
16
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps
-
Sep. 8-10
-
M. Ramadas, S. Ostermann, and B. Tjaden, "Detecting anomalous network traffic with self-organizing maps," in Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003), Pitts-burgh, Pennsylvania, pp. 36-54, Sep. 8-10 2003.
-
(2003)
in Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003), Pitts-burgh, Pennsylvania
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
17
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bolli-neni, "A fast automaton-based method for detecting anomalous program behaviors," in Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 144-155, 2000.
-
(2000)
in Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bolli-neni, P.4
-
18
-
-
35048885009
-
Anomalyous payload-based network intrusion detection
-
K. Wang and S. J. Stolfo, "Anomalyous payload-based network intrusion detection," in Proceedings of RAID, pp. 203-222, 2004.
-
(2004)
in Proceedings of RAID
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
19
-
-
84874709035
-
-
Wikipedia, Def
-
Wikipedia, Def. of 'Intrusion-Detection System', http://en.wikipedia.org/w/wiki.phtml?title=Intrusion-detection_system.
-
of 'Intrusion-Detection System'
-
-
|