-
1
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
Berkeley, California, IEEE Computer Society
-
H. H. Feng, J. T. Giffin, Y. Huang, S. Jha, W. Lee, and B. P. Miller. Formalizing sensitivity in static analysis for intrusion detection. In Proceedings: IEEE Symposium on Security and Privacy, Berkeley, California, 2004. IEEE Computer Society.
-
(2004)
Proceedings: IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Giffin, J.T.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.P.6
-
2
-
-
0038825045
-
Anomaly detection using call stack information
-
Berkeley, California, IEEE Computer Society
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. In Proceedings: IEEE Symposium on Security and Privacy, Berkeley, California, 2003. IEEE Computer Society.
-
(2003)
Proceedings: IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
3
-
-
0029716418
-
A sense of self for unix processes
-
Los Alamitos, California
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In Proceedings: IEEE Symposium on Security and Privacy, pages 120-128, Los Alamitos, California, 1996.
-
(1996)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
8
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. Kemmerer, and P. Porras. State transition analysis: a rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
10
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, Texas
-
W. Lee and S. J. Stolfo. Data mining approaches for intrusion detection. In Proceedings: USENIX Security Symposium, pages 79-94, San Antonio, Texas, 1998.
-
(1998)
Proceedings: USENIX Security Symposium
, pp. 79-94
-
-
Lee, W.1
Stolfo, S.J.2
-
13
-
-
0033295259
-
BrO: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Network, 31(23), 1999.
-
(1999)
Computer Network
, vol.31
, Issue.23
-
-
Paxson, V.1
-
14
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Oakland, California, IEEE Computer Society
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In Proceedings: IEEE Symposium on Security and Privacy, pages 144-155, Oakland, California, 2001. IEEE Computer Society.
-
(2001)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
15
-
-
85084164032
-
Automated response using system-call delays
-
Denver, Colorado
-
A. Somayaji. Automated response using system-call delays. In Proceedings: USENIX Security Symposium, pages 185-197, Denver, Colorado, 2000.
-
(2000)
Proceedings: USENIX Security Symposium
, pp. 185-197
-
-
Somayaji, A.1
-
16
-
-
84880858814
-
Why 6?” Defining the operational limits of stide, an anomaly-based intrusion detector
-
Berkeley, California, IEEE Computer Society
-
K. M. Tan and R. A. Maxion. “Why 6?” Defining the operational limits of stide, an anomaly-based intrusion detector. In Proceedings: IEEE Symposium on Security and Privacy, pages 173-186, Berkeley, California, 2002. IEEE Computer Society.
-
(2002)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 173-186
-
-
Tan, K.M.1
Maxion, R.A.2
-
18
-
-
0034836394
-
Intrusion detection via static analysis
-
Oakland, California, IEEE Computer Society
-
D. Wagner and D. Dean. Intrusion detection via static analysis. In Proceedings: IEEE Symposium on Security and Privacy, pages 156-169, Oakland, California, 2001. IEEE Computer Society.
-
(2001)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 156-169
-
-
Wagner, D.1
Dean, D.2
-
20
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Los Alamitos, California
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: alternative data models. In Proceedings: IEEE Symposium on Security and Privacy, pages 133-145, Los Alamitos, California, 1999.
-
(1999)
Proceedings: IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|