-
1
-
-
0003907293
-
-
Macmillan Publishing Co., Inc
-
Bace, R.: Intrusion detection. Macmillan Publishing Co., Inc. (2000)
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
2
-
-
0034226287
-
A Revised Taxonomy of Intrusion-Detection Systems
-
Debar, H., Dacier, M., Wespi, A.: A Revised Taxonomy of Intrusion-Detection Systems. Annales des T́eĺecommunications 55(7-8) (2000) 361-378
-
(2000)
Annales Des T́eĺecommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
3
-
-
0003914522
-
State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99TR-028
-
Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99TR-028, Carnegie-Mellon University - Software Engineering Institute (2000)
-
(2000)
Carnegie-Mellon University - Software Engineering Institute
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
5
-
-
84882760438
-
-
Sourcefire: Snort Network Intrusion Detection System web site
-
Sourcefire: Snort Network Intrusion Detection System web site (1999) URL http://www.snort.org.
-
(1999)
-
-
-
6
-
-
35048885009
-
Anomalous Payload-Based Network Intrusion Detection
-
In Jonsson, E., Valdes, A., Almgren, M., eds., LNCS., Springer-Verlag
-
Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In Jonsson, E., Valdes, A., Almgren, M., eds.: RAID '04: Proc. 7th Symposium on Recent Advances in Intrusion Detection. Volume 3224 of LNCS., Springer-Verlag (2004) 203-222
-
(2004)
RAID '04: Proc. 7th Symposium On Recent Advances In Intrusion Detection
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
7
-
-
33750937412
-
POSEIDON: A 2-tier Anomaly-based Network Intrusion Detection System
-
IEEE Computer Society Press
-
Bolzoni, D., Zambon, E., et-alle, S., Hartel, P.: POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. In: IWIA '06: Proc. 4th IEEE International Workshop on Information Assurance, IEEE Computer Society Press (2006) 144-156
-
(2006)
IWIA '06: Proc. 4th IEEE International Workshop On Information Assurance
, pp. 144-156
-
-
Bolzoni, D.1
Zambon, E.2
Etalle, S.3
Hartel, P.4
-
8
-
-
0033293396
-
-
Debar, H., Dacier, M.,Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks 31(8) (1999) 805-822
-
(1999)
Dacier, M.,Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
-
9
-
-
1642416386
-
The 1998 DARPA/AFRL off-line intrusion detection evaluation
-
Lippmann, R.P., Cunningham, R.K., Fried, D.J., Garfinkel, S.L., Gorton, A.S., Graf, I., Kendall, K.R., McClung, D.J., Weber, D.J., Webster, S.E., D. Wyschogrod, M.A.Z.: The 1998 DARPA/AFRL off-line intrusion detection evaluation. In: RAID '98: Proc. 1st International Workshop on the Recent Advances in Intrusion Detection. (1998)
-
(1998)
RAID '98: Proc. 1st International Workshop On the Recent Advances In Intrusion Detection
-
-
Lippmann, R.P.1
Cunningham, R.K.2
Fried, D.J.3
Garfinkel, S.L.4
Gorton, A.S.5
Graf, I.6
Kendall, K.R.7
McClung, D.J.8
Weber, D.J.9
Webster, S.E.10
Wyschogrod, D.11
-
10
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks: The International Journal of Computer and Telecommunications Networking 34(4) (2000) 579-595
-
(2000)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
11
-
-
33750939148
-
The UCI KDD archive of large data sets for data mining research and experimentation
-
Bay, S.D., Kibler, D., Pazzani, M., Smyth, P.: The UCI KDD archive of large data sets for data mining research and experimentation. SIGKDD Exploration: Newsletter of SIGKDD and Data Mining 2(2) (2000) 81-85
-
(2000)
SIGKDD Exploration: Newsletter of SIGKDD and Data Mining
, vol.2
, Issue.2
, pp. 81-85
-
-
Bay, S.D.1
Kibler, D.2
Pazzani, M.3
Smyth, P.4
-
13
-
-
84882765690
-
Self-Organizing Maps. Volume 30 of Springer Series in Information Sciences
-
Kohonen, T.: Self-Organizing Maps. Volume 30 of Springer Series in Information Sciences. Springer (1995) (Second Extended Edition 1997).
-
(1997)
Springer (1995) (Second Extended Edition
-
-
Kohonen, T.1
-
15
-
-
84885774862
-
A Framework for Constructing Features andModels for Intrusion Detection Systems
-
Lee, W., Stolfo, S.J.: A Framework for Constructing Features andModels for Intrusion Detection Systems. ACM Transactions on Information and System Security 3(4) (2000) 227-261
-
(2000)
ACM Transactions On Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
16
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
ACM Press
-
Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: SAC '02: Proc. 2002 ACM Symposium on Applied Computing, ACM Press (2002) 201-208
-
(2002)
SAC '02
, pp. 201-208
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
17
-
-
0011192575
-
-
CERT, Technical report, CERT Coordination Center
-
CERT: Ip Denial of Service Attacks. Technical report, CERT Coordination Center (1997) http://www.cert.org/advisories/CA-1997-28.html.
-
(1997)
Ip Denial of Service Attacks
-
-
-
18
-
-
84882780127
-
-
Web Application Security Consortium: Web Security Threat Classification, URL
-
Web Application Security Consortium: Web Security Threat Classification (2005) URL http://www.webappsec.org/projects/threat/.
-
(2005)
-
-
-
21
-
-
84882769028
-
-
PostNuke, PostNuke Content Managament System, URL
-
PostNuke: PostNuke Content Managament System (2006) URL http://www.postnuke.com/.
-
(2006)
-
-
-
28
-
-
0028911698
-
Gauging similarity with n-grams: Language-independent categorization of text
-
Damashek, M.: Gauging similarity with n-grams: Language-independent categorization of text. Science 267(5199) (1995) 843-848
-
(1995)
Science
, vol.267
, Issue.5199
, pp. 843-848
-
-
Damashek, M.1
-
29
-
-
35248857893
-
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
-
In Vigna, G., Kruegel, C., Jonsson, E., eds., Volume 2820 of LNCS., Springer-Verlag
-
Mahoney, M.V., Chan, P.K.: An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In Vigna, G., Kruegel, C., Jonsson, E., eds.: RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection. Volume 2820 of LNCS., Springer-Verlag (2003) 220-237
-
(2003)
RAID '03: Proc. 6th Symposium On Recent Advances In Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
|