-
1
-
-
84952952709
-
Intrusion detection systems stymie network hackers
-
Anonymous (2000) ‘Intrusion detection systems stymie network hackers’, Security, Vol. 37, No. 7, pp.58–60.
-
(2000)
Security
, vol.37
, Issue.7
, pp. 58-60
-
-
Anonymous1
-
2
-
-
0024908181
-
Intrusion detection: an application of expert systems to computer security
-
Bauer, D.S., Eichelman II., F.R., Herrera, R.M. and Irgon, A.E. (1989) ‘Intrusion detection: an application of expert systems to computer security’, Proceedings of the International Carnahan Conference on Security Technology, pp.97–100.
-
(1989)
Proceedings of the International Carnahan Conference on Security Technology
, pp. 97-100
-
-
Bauer, D.S.1
Eichelman, F.R.2
Herrera, R.M.3
Irgon, A.E.4
-
3
-
-
0004150519
-
-
New York: John Wiley & Sons
-
Bernstein, T., Bhimani, A., Schultz, E. and Siegel, C. (1996) Internet Security for Business, New York: John Wiley & Sons.
-
(1996)
Internet Security for Business
-
-
Bernstein, T.1
Bhimani, A.2
Schultz, E.3
Siegel, C.4
-
4
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables – a feasibility study
-
May, Seattle, WA
-
Cabrera, J.B.D., Lewis, L., Qin, X., Lee, W., Prasanth, R.K., Ravichandran, B. and Mehra, R.K. (2001) ‘Proactive detection of distributed denial of service attacks using MIB traffic variables – a feasibility study’, Proceedings of the Seventh IFIP/IEEE International Symposium on Integrated Network Management, May, Seattle, WA.
-
(2001)
Proceedings of the Seventh IFIP/IEEE International Symposium on Integrated Network Management
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Prasanth, R.K.5
Ravichandran, B.6
Mehra, R.K.7
-
5
-
-
77954749297
-
Proactive intrusion detection and SNMP – based security management: new experiments and validation
-
Cabrera, J.B.D., Lewis, L.M., Qin, X., Gutierrez, C., Lee, W. and Mehra, R.K. (2003) ‘Proactive intrusion detection and SNMP – based security management: new experiments and validation’, Integrated Network Management, pp.93–96.
-
(2003)
Integrated Network Management
, pp. 93-96
-
-
Cabrera, J.B.D.1
Lewis, L.M.2
Qin, X.3
Gutierrez, C.4
Lee, W.5
Mehra, R.K.6
-
6
-
-
84860495162
-
-
DARPA Information Survivability Conference, Washington, DC
-
Cheung, S., Lindqvist, U. and Fong, M.W. (2003) Modeling Multi Step Cyber Attacks for Scenario Recognition, DARPA Information Survivability Conference, Washington, DC.
-
(2003)
Modeling Multi Step Cyber Attacks for Scenario Recognition
-
-
Cheung, S.1
Lindqvist, U.2
Fong, M.W.3
-
7
-
-
0028742960
-
Intrusion detection: approach and performance issues of the SECURENET system
-
Denault, M., Gritzalis, D., Karagiannis, D. and Spirakis, P. (1994) ‘Intrusion detection: approach and performance issues of the SECURENET system’, Computers and Security, Vol. 13, pp.495–508.
-
(1994)
Computers and Security
, vol.13
, pp. 495-508
-
-
Denault, M.1
Gritzalis, D.2
Karagiannis, D.3
Spirakis, P.4
-
8
-
-
0023294428
-
An intrusion-detection model
-
Denning, D.E. (1987) ‘An intrusion-detection model’, IEEE Transactions on Software Engineering, SE-13, No. 2, pp.222–232.
-
(1987)
IEEE Transactions on Software Engineering, SE-
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
10
-
-
33847310953
-
Adaptive model generation for intrusion detection systems
-
November, Athens, Greece
-
Eskin, E., Miller, M., Zhong, Z., Yi, G., Lee, W. and Stelfe, S. (2000) ‘Adaptive model generation for intrusion detection systems’, Workshop on Intrusion Detection and Prevention, Seventh ACM Conference on Computer Security, November, Athens, Greece.
-
(2000)
Workshop on Intrusion Detection and Prevention, Seventh ACM Conference on Computer Security
-
-
Eskin, E.1
Miller, M.2
Zhong, Z.3
Yi, G.4
Lee, W.5
Stelfe, S.6
-
11
-
-
85084160767
-
On gray – box program tracking for anomaly detection
-
August, San Diego, CA
-
Gao, D., Reiter, M.K. and Song, D. (2004) ‘On gray – box program tracking for anomaly detection’, Thirteenth USEIX Security Symposium, August, San Diego, CA, pp.9–13.
-
(2004)
Thirteenth USEIX Security Symposium
, pp. 9-13
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
13
-
-
84964526751
-
Extending the DARPA off-line intrusion detection evaluation
-
June, Anaheim, CA
-
Haines, J.W., Rossey, L.M. and Lippmann, R.P. (2001) ‘Extending the DARPA off-line intrusion detection evaluation’, Proceedings of DISCEX, June, Anaheim, CA, pp.11–12.
-
(2001)
Proceedings of DISCEX
, pp. 11-12
-
-
Haines, J.W.1
Rossey, L.M.2
Lippmann, R.P.3
-
14
-
-
0035789299
-
Mining time-changing data streams
-
August, San Francisco, CA
-
Hulten, G., Spencer, L. and Domingos, P. (2001) ‘Mining time-changing data streams’, Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August, San Francisco, CA.
-
(2001)
Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Hulten, G.1
Spencer, L.2
Domingos, P.3
-
15
-
-
0037244227
-
A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
-
Iheagwara, C., Blyth, A. and Singhal, M. (2003) ‘A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment’, Journal of Computer Security, Vol. 11, No. 1, pp.1–33.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 1-33
-
-
Iheagwara, C.1
Blyth, A.2
Singhal, M.3
-
16
-
-
0029267472
-
State transition analysis: a rule based intrusion detection system
-
Ilgun, K., Kemmerer, R.A. and Porras, P.A. (1995) ‘State transition analysis: a rule based intrusion detection system’, IEEE Transactions on Software Engineering, Vol. 21, No. 3, pp.181–189.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-189
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
17
-
-
0036090464
-
Using internal sensors and embedded detectors for intrusion detection
-
Kerschbaum, F., Spafford, E.H. and Zamboni, D. (2002) ‘Using internal sensors and embedded detectors for intrusion detection’, Journal of Computer Security, Vol. 11, Nos. 1/2, pp.23–70.
-
(2002)
Journal of Computer Security
, vol.11
, Issue.1-2
, pp. 23-70
-
-
Kerschbaum, F.1
Spafford, E.H.2
Zamboni, D.3
-
18
-
-
0033726577
-
Logic induction of valid behavior specifications for intrusion detection
-
May, Oakland, CA
-
Ko, C. (2000) ‘Logic induction of valid behavior specifications for intrusion detection’, IEEE Symposium on Security and Privacy, May, Oakland, CA.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Ko, C.1
-
19
-
-
85077733517
-
High coverage detection of input-related security faults
-
August, Washington, DC
-
Larson, E. and Austin, T. (2003) ‘High coverage detection of input-related security faults’, Twelfth USENIX Security Symposium, August, Washington, DC, pp.4–8.
-
(2003)
Twelfth USENIX Security Symposium
, pp. 4-8
-
-
Larson, E.1
Austin, T.2
-
20
-
-
0013114810
-
Data mining in work flow environment experiences in intrusion detection
-
August, San Diego, CA
-
Lee, W., Stolfo, S.J. and Mok, K. (1999) ‘Data mining in work flow environment experiences in intrusion detection’, Proceedings of the Fifth ACM SIGKDD Conference on Knowledge Discovery and Data Mining, August, San Diego, CA.
-
(1999)
Proceedings of the Fifth ACM SIGKDD Conference on Knowledge Discovery and Data Mining
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
21
-
-
3242859958
-
Expert system-user integrated adaptive systems
-
Levary, R.R. and Madeo, L.A. (1991) ‘Expert system-user integrated adaptive systems’, Expert Systems with Applications, Vol. 3, pp.489–498.
-
(1991)
Expert Systems with Applications
, vol.3
, pp. 489-498
-
-
Levary, R.R.1
Madeo, L.A.2
-
22
-
-
85084160262
-
Using text categorization techniques for intrusion detection
-
August, San Francisco, CA
-
Liao, Y. and Vermuti, R. (2002) ‘Using text categorization techniques for intrusion detection’, Eleventh USENIX Security Symposium, August, San Francisco, CA, pp.5–9.
-
(2002)
Eleventh USENIX Security Symposium
, pp. 5-9
-
-
Liao, Y.1
Vermuti, R.2
-
23
-
-
84940110274
-
Detecting computer and network misuse through the production-based expert system tool set
-
May, Berkeley, CA
-
Lindqvist, U. and Porras, P.A. (1999) ‘Detecting computer and network misuse through the production-based expert system tool set’, IEEE Symposium on Security and Privacy, May, Berkeley, CA.
-
(1999)
IEEE Symposium on Security and Privacy
-
-
Lindqvist, U.1
Porras, P.A.2
-
26
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
November, Philadelphia
-
Portnoy, L., Eskin, E. and Stolto, S.J. (2001) ‘Intrusion detection with unlabeled data using clustering’, Proceedings of ACM CSS Workshop on Data Mining Applied to Security, November, Philadelphia.
-
(2001)
Proceedings of ACM CSS Workshop on Data Mining Applied to Security
-
-
Portnoy, L.1
Eskin, E.2
Stolto, S.J.3
-
27
-
-
0032374128
-
CSI roundtable: experts discuss present and future intrusion detection systems
-
Power, R. (1998), ‘CSI roundtable: experts discuss present and future intrusion detection systems’, Computer Security Journal, Vol. XIV, No. 1, pp.1–14.
-
(1998)
Computer Security Journal
, vol.14
, Issue.1
, pp. 1-14
-
-
Power, R.1
-
29
-
-
84952954230
-
ChAD: Change and anomaly detection
-
Seventh ACM Conference on Computer Security, November, Athens, Greece
-
Stottler, Honke Associates, Inc. (2000) ‘ChAD: Change and anomaly detection’, Workshop on Intrusion Detection and Prevention, Seventh ACM Conference on Computer Security, November, Athens, Greece.
-
(2000)
Workshop on Intrusion Detection and Prevention
-
-
|