-
3
-
-
14944363571
-
Towards understanding distributed blackhole placement
-
Virginia, October 29
-
E. Cooke, M. Bailey, D. Watson, F. Jahanian, and D. McPherson. Towards understanding distributed blackhole placement. In The 2nd Workshop on Rapid Malcode (WORM) Fairfax, Virginia, October 29, 2004.
-
(2004)
The 2nd Workshop on Rapid Malcode (WORM) Fairfax
-
-
Cooke, E.1
Bailey, M.2
Watson, D.3
Jahanian, F.4
Mcpherson, D.5
-
8
-
-
0343302298
-
ASAX: Software architecture and rule-based language for universal audit trail analysis
-
N. Habra, B. L. Charlier, A. Mounji, and I. Mathieu. ASAX: Software architecture and rule-based language for universal audit trail analysis. In ESORICS, 1992.
-
(1992)
ESORICS
-
-
Habra, N.1
Charlier, B.L.2
Mounji, A.3
Mathieu, I.4
-
10
-
-
0027593257
-
NADIR: An automated system for detecting network intrusions and misuse
-
1993
-
J. Hochberg, K. Jackson, C. Stallings, J. McClary, and J. DuBois, D.and Ford. NADIR: An automated system for detecting network intrusions and misuse. In Proceedings of Computers and Security 12(1993)3, 1993.
-
(1993)
Proceedings of Computers and Security
, vol.12
, pp. 3
-
-
Hochberg, J.1
Jackson, K.2
Stallings, C.3
Mcclary, J.4
Dubois, J.5
Ford, D.6
-
11
-
-
84942253601
-
COSSACK: Coordinated suppression of simultaneous attacks
-
A. Hussain, J. Heidemann, and C. Papadopoulos. COSSACK: Coordinated Suppression of Simultaneous Attacks. In DISCEX, 2003.
-
(2003)
DISCEX
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
13
-
-
85084159849
-
Privacy-preserving sharing and correlation of security alerts
-
San Diego, CA
-
P. Lincoln, P. Porras, and V. Shmatikov. Privacy-Preserving Sharing and Correlation of Security Alerts. In Usenix Security 2004, San Diego, CA.
-
Usenix Security 2004
-
-
Lincoln, P.1
Porras, P.2
Shmatikov, V.3
-
14
-
-
31844451490
-
Collaborative distributive intrusion detection
-
M. Locasto and et al. Collaborative Distributive Intrusion Detection. In CU Tech Report CUCS-012-04, 2004.
-
(2004)
CU Tech Report CUCS-012-04
-
-
Locasto, M.1
-
15
-
-
0001833836
-
A framework for cooperative intrusion detection
-
J. McConnell, D. Frincke, D. Tobin, J. Marconi, and D. Polla. A framework for cooperative intrusion detection. In NISSC, pages 361-373, 1998.
-
(1998)
NISSC
, pp. 361-373
-
-
Mcconnell, J.1
Frincke, D.2
Tobin, D.3
Marconi, J.4
Polla, D.5
-
16
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code. In INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
19
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
(Amsterdam, Netherlands: 1999)
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks (Amsterdam, Netherlands: 1999), 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
21
-
-
0002473030
-
Distributed intrusion detection system - Motivation, architecture, and an early prototype
-
A. Snapp and et. al. Distributed intrusion detection system - motivation, architecture, and an early prototype. In Proceedings of the 14th NCSC, 1991.
-
(1991)
Proceedings of the 14th NCSC
-
-
Snapp, A.1
-
22
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Z. D.
-
E. Spafford and Z. D. Intrusion detection using autonomous agents. In Computer Networks, Volume 34, 2000.
-
(2000)
Computer Networks
, vol.34
-
-
Spafford, E.1
-
27
-
-
0040749982
-
Cooperating security managers: Distributed intrusion detection systems
-
U. White, G. B.; Pooch. Cooperating security managers: distributed intrusion detection systems. In Computers & Security, Vol. 15, No. 5, pages 441-450, 1996.
-
(1996)
Computers & Security
, vol.15
, Issue.5
, pp. 441-450
-
-
White, U.1
Pooch, G.B.2
-
29
-
-
35048846516
-
Behavioral intrusion detection
-
S. Zanero. Behavioral Intrusion Detection. In ISCIS 2004.
-
ISCIS 2004
-
-
Zanero, S.1
|