-
1
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31(23-24), 2435-2463 (1999)
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
4
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
August
-
Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 186-205 (August 2000)
-
(2000)
ACM Transactions on Information and System Security
, pp. 186-205
-
-
Axelsson, S.1
-
5
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
January
-
Hwang, K., Cai, M., Chen, Y., Qin, M.: Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. IEEE Transactions on Dependable and Secure Computing, 41-55 (January 2007)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
7
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information System Security, 262-294 (2000)
-
(2000)
ACM Transactions on Information System Security
, pp. 262-294
-
-
McHugh, J.1
-
8
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K., Zissman, M.A.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of the DARPA Information Survivability Conference and Exposition, pp. 12-26 (2000)
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
9
-
-
0004145058
-
Insertion evation and denial of service: Eluding network intrusion detection
-
January
-
Ptacek, T.H., Newsham, T.N.: Insertion, evation, and denial of service: Eluding network intrusion detection. Technical Report, Secure Networks (January 1998)
-
(1998)
Technical Report Secure Networks
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
10
-
-
26444436687
-
Using adaptive alert classification to reduce false positives in intrusion detection
-
Jonsson E. Valdes A. Almgren M. eds. Springer Heidelberg
-
Pietraszek, T.: Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 102-124. Springer, Heidelberg (2004)
-
(2004)
RAID 2004 LNCS
, vol.3224
, pp. 102-124
-
-
Pietraszek, T.1
-
11
-
-
0034301662
-
A data mining analysis of RTID alarms
-
October
-
Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A data mining analysis of RTID alarms. Computer Networks, 571-577 (October 2000)
-
(2000)
Computer Networks
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
12
-
-
23944484457
-
IDS false alarm filtering using KNN classifier
-
Lim C.H Yung M. eds Springer Heidelberg
-
Law, K.H., Kwok, L.F.: IDS False Alarm Filtering Using KNN Classifier. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 114-121. Springer, Heidelberg (2005)
-
(2005)
WISA 2004. LNCS
, vol.3325
, pp. 114-121
-
-
Law, K.H.1
Kwok, L.F.2
-
13
-
-
33947673977
-
Controlling false alarms with support vector machines
-
May
-
Davenport, M.A., Baraniuk, R.G., Scott, C.D.: Controlling false alarms with support vector machines. In: International Conference on Acoustics, Speech and Signal (ICASSP), pp. 589- 592 (May 2006)
-
(2006)
International Conference on Acoustics Speech and Signal ICASSP
, pp. 589-592
-
-
Davenport, M.A.1
Baraniuk, R.G.2
Scott, C.D.3
-
14
-
-
26444495635
-
IDS false alarmreduction using continuous and discontinuous patterns
-
Ioannidis J Keromytis A.D Yung M. eds Springer Heidelberg
-
Alharby, A., Imai, H.: IDS false alarmreduction using continuous and discontinuous patterns. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 192- 205. Springer, Heidelberg (2005)
-
(2005)
ACNS 2005. LNCS
, vol.3531
, pp. 192-205
-
-
Alharby, A.1
Imai, H.2
-
18
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
October
-
Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks: The International Journal of Computer and Telecommunications Networking, 579-595 (October 2000)
-
(2000)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
|