-
1
-
-
78049484171
-
Ernst and Young 2006 global information security survey: Achieving success in a globalized world, is yuor way secure?
-
"Ernst and Young 2006 global information security survey: Achieving success in a globalized world, is yuor way secure?" Ernst and Young" White Paper, 2006.
-
(2006)
Ernst and Young White Paper
-
-
-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson The base-rate fallacy and the difficulty of intrusion detection ACM Transactions on Information and System Security vol. 3 no. 3 2000 186 205
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
4
-
-
78049478221
-
-
R. Bace, and P. Mell "Intrusion detection systems (IDS)," National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Special Publication 800-31 2001
-
(2001)
"intrusion Detection Systems (IDS)," National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Special Publication 800-31
-
-
Bace, R.1
Mell, P.2
-
5
-
-
35248836533
-
Specification-based intrusion detection for automated response
-
I. Balepin, S. Maltsev, J. Rowe, and K. Levitt Specification-based intrusion detection for automated response Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID 2003), Pittsburg, PA September 8-10 2003 136 154
-
(2003)
Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID 2003), Pittsburg, PA
, pp. 136-154
-
-
Balepin, I.1
Maltsev, S.2
Rowe, J.3
Levitt, K.4
-
6
-
-
0142221933
-
An intrusion response taxonomy and its role in automatic intrusion response
-
C.A. Carver Jr., and U.W. Pooch An intrusion response taxonomy and its role in automatic intrusion response Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY June 6-7 2000 11 20
-
(2000)
Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY
, pp. 11-20
-
-
Carver Jr., C.A.1
Pooch, U.W.2
-
7
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
H. Cavusoglu, and S. Raghunathan Configuration of detection software: a comparison of decision and game theory approaches Decision Analysis 1 3 2004 131 148
-
(2004)
Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
9
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
J.E. Gaffney Jr., and J.W. Ulvila A decision analysis method for evaluating computer intrusion detection systems In Ecision Analysis 1 1 2004 35 50
-
(2004)
Ecision Analysis
, vol.1
, Issue.1
, pp. 35-50
-
-
Gaffney Jr., J.E.1
Ulvila, J.W.2
-
11
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, and S.J. Stolfo A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security 3 4 2000 227 261
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
12
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Miller, S.J. Stolfo, and E. Zadok Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security 10 2002 5 22 (Pubitemid 34531411)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
13
-
-
84964446488
-
Survivable autonomic response architecture
-
S.M. Lewandowski, D.J.V. Hook, G.C. O'Leary, J.W. Haines, and L.M. Rossey Survivable autonomic response architecture Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX'01), vol. 1, Anaheim CA 2001 77 88
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX'01), Vol. 1, Anaheim CA
, pp. 77-88
-
-
Lewandowski, S.M.1
Hook, D.J.V.2
O'Leary, G.C.3
Haines, J.W.4
Rossey, L.M.5
-
14
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, and M.A. Zissman Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), vol. 2 2000 1012 1026
-
(2000)
Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), Vol. 2
, pp. 1012-1026
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
15
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
R.P. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das The 1999 DARPA off-line intrusion detection evaluation Computer Networks 34 4 2000 579 595
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.P.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
21
-
-
36949004275
-
Software decoys for software counterintelligence
-
N.C. Rowe, J.B. Michael, M. Auguston, and R. Riehle Software decoys for software counterintelligence IAnewsletter 5 1 2002 10 12
-
(2002)
IAnewsletter
, vol.5
, Issue.1
, pp. 10-12
-
-
Rowe, N.C.1
Michael, J.B.2
Auguston, M.3
Riehle, R.4
-
22
-
-
1842829828
-
Risk management guide for information technology systems
-
G. Stoneburner, A. Goguen, and A. Feringa Risk management guide for information technology systems Tech. Rep., National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Special Publication 800-30 2002
-
(2002)
Tech. Rep., National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, Special Publication 800-30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
25
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
J.W. Ulvila, and J.E. Gaffney Jr. A decision analysis method for evaluating computer intrusion detection systems Decision Analysis 1 1 2004 35 50
-
(2004)
Decision Analysis
, vol.1
, Issue.1
, pp. 35-50
-
-
Ulvila, J.W.1
Gaffney Jr., J.E.2
-
27
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
DOI 10.1109/TC.2002.1017701
-
Q.C.N. Ye, S.M. Emran, and S. Vilbert Multivariate statistical analysis of audit trails for host-based intrusion detection IEEE Transactions on Computers 51 7 2002 810 820 (Pubitemid 34835448)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
|