-
1
-
-
0038458235
-
Active defense of a computer system using autonomous agents
-
West Lafayette, IN: 47907-1398
-
Crosbie, M. and G. Spafford, 1995. Active defense of a computer system using autonomous agents. Technical Report 95-008, COAST Group, Purdue University. West Lafayette, IN: 47907-1398.
-
(1995)
Technical Report 95-008, COAST Group, Purdue University
-
-
Crosbie, M.1
Spafford, G.2
-
2
-
-
0003478316
-
-
Technical report, University of New Mexico
-
Heady, R., G. Luger, A. Maccabe and M. Servilla, 1990. The architecture of a network level intrusion detection system. Technical report, University of New Mexico.
-
(1990)
The architecture of a network level intrusion detection system
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
3
-
-
0024984013
-
A network security monitor
-
Heberlein, L., G. Dias, K. Levitt, B. Mukherjee, J. Wood andD. Wolber, 1990. A network security monitor. In: Proc. IEEE. Symp. Res. Security Privacy, pp: 296-304.
-
(1990)
In: Proc. IEEE Symp. Res. Security Privacy
, pp. 296-304
-
-
Heberlein, L.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
4
-
-
0003405432
-
The C Programming Language
-
2nd Edn Englewood Cliffs, NJ 07632, USA
-
Kemighan, B.W. and D.M. Ritchie, 1988. The C Programming Language. Prentice-Hall. 2nd Edn. Englewood Cliffs, NJ 07632, USA.
-
(1988)
Prentice-Hall
-
-
Kemighan, B.W.1
Ritchie, D.M.2
-
5
-
-
0028430224
-
Network intrusion detection
-
Network
-
Mukherjee, B., T.L. Heberlein and K.N. Levitt, 1994. Network intrusion detection. IEEE. Network, 8(3): 26-41.
-
(1994)
IEEE
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, T.L.2
Levitt, K.N.3
-
6
-
-
0004145058
-
-
Technical report, Secure Networks, Inc.
-
Ptacek, T.H. and T.N. Newsham, 1998. Insertion, evasion and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc.
-
(1998)
Insertion, evasion and denial of service: Eluding network intrusion detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
7
-
-
0000949239
-
GrIDS: A graph based intrusion detection system for large networks
-
Staniford-Chen, S., S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip and D. Zerkle, 1996. GrIDS: A graph based intrusion detection system for large networks. In: Proc. 19th National Information Systems Security Conference. National Institute of Standards and Technology, 1: 361-370.
-
(1996)
In: Proc. 19th National Information Systems Security Conference National Institute of Standards and Technology
, vol.1
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
8
-
-
0004207406
-
Programming Perl. 2nd Edn
-
O'Reilly and Associates, Inc
-
Wall, L., T. Christiansen and R.L. Schwartz, 1996. Programming Perl. 2nd Edn. O'Reilly and Associates, Inc.
-
(1996)
-
-
Wall, L.1
Christiansen, T.2
Schwartz, R.L.3
-
9
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
White, G.B., E.A. Fisch and U.W. Pooch, 1996. Cooperating security managers: A peer-based intrusion detection system. IEEE Network, pp: 20-23.
-
(1996)
IEEE Network
, pp. 20-23
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
|