-
2
-
-
18744406314
-
The origin of bursts and heavy tails in human dynamics
-
A.L. Barabsi The origin of bursts and heavy tails in human dynamics Nature 435 2005 207 211
-
(2005)
Nature
, vol.435
, pp. 207-211
-
-
Barabsi, A.L.1
-
3
-
-
77950566663
-
Analysis of the 1999 DARPA/Lincoln laboratory IDS evaluation data with netadhict
-
IEEE Press Piscataway, NJ, USA
-
C. Brown, A. Cowperthwaite, A. Hijazi, and A. Somayaji Analysis of the 1999 DARPA/Lincoln laboratory IDS evaluation data with netadhict Proceedings of the second IEEE international conference on computational intelligence for security and defense applications 2009 IEEE Press Piscataway, NJ, USA 67 73
-
(2009)
Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications
, pp. 67-73
-
-
Brown, C.1
Cowperthwaite, A.2
Hijazi, A.3
Somayaji, A.4
-
5
-
-
8344272005
-
Stochastic models for generating synthetic HTTP source traffic
-
J. Cao, W.S. Cleveland, Y. Gao, K. Jeffay, F.D. Smith, and M.C. Weigle Stochastic models for generating synthetic HTTP source traffic IEEE INFOCOM 2004
-
(2004)
IEEE Infocom
-
-
Cao, J.1
Cleveland, W.S.2
Gao, Y.3
Jeffay, K.4
Smith, F.D.5
Weigle, M.C.6
-
8
-
-
33847112108
-
Scale-free topology of e-mail networks
-
H. Ebel, L.I. Mielsch, and S. Bornholdt Scale-free topology of e-mail networks Phys Rev E 66 2002 35 103
-
(2002)
Phys Rev e
, vol.66
, pp. 35-103
-
-
Ebel, H.1
Mielsch, L.I.2
Bornholdt, S.3
-
9
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S.T. Eckmann, G. Vigna, and R.A. Kemmerer STATL: an attack language for state-based intrusion detection J Comput Secur 10 2002 71 103 (Pubitemid 34531413)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-103
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
14
-
-
1542597362
-
Rapid model parameterization from traffic measurements
-
K.C. Lan, and J.S. Heidemann Rapid model parameterization from traffic measurements ACM T Model Comput S 12 2002 201 229
-
(2002)
ACM T Model Comput S
, vol.12
, pp. 201-229
-
-
Lan, K.C.1
Heidemann, J.S.2
-
15
-
-
84859426794
-
-
Lawrence Berkeley National Laboratory and ICSI
-
Lawrence Berkeley National Laboratory and ICSI. LBNL/ICSI enterprise tracing project. www.icir.org/enterprise-tracing/.
-
LBNL/ICSI Enterprise Tracing Project
-
-
-
16
-
-
1542313508
-
-
Berkeley National Laboratory L.
-
Lawrence Berkeley National Laboratory The internet traffic archive 2010 http://ita.ee.lbl.gov/index.html
-
(2010)
The Internet Traffic Archive
-
-
-
17
-
-
0003993827
-
-
Lincoln Laboratory M.I.T.
-
M.I.T. Lincoln Laboratory DARPA intrusion detection evaluation 2011 http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/index.html
-
(2011)
DARPA Intrusion Detection Evaluation
-
-
-
19
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
-
J. Mchugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory ACM Trans Inf Syst Secur 3 2000 262 294
-
(2000)
ACM Trans Inf Syst Secur
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
23
-
-
84903593793
-
An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems
-
D. Mutz, G. Vigna, and R.A. Kemmerer An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems Annual computer security applications conference 2003 374 383
-
(2003)
Annual Computer Security Applications Conference
, pp. 374-383
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.A.3
-
25
-
-
0028491368
-
Empirically derived analytic models of wide-area TCP connections
-
V. Paxson Empirically derived analytic models of wide-area TCP connections IEEE/ACM Trans Netw 2 1994 316 336
-
(1994)
IEEE/ACM Trans Netw
, vol.2
, pp. 316-336
-
-
Paxson, V.1
-
29
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
R. Sommer, and V. Paxson Outside the closed world: on using machine learning for network intrusion detection Security and privacy, IEEE Symposium on 2010 305 316
-
(2010)
Security and Privacy, IEEE Symposium on
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
33
-
-
84859420819
-
-
The Shmoo Group
-
The Shmoo Group Defcon 2011 http://cctf.shmoo.com/
-
(2011)
Defcon
-
-
-
34
-
-
0141723181
-
-
University Of California
-
University of California KDD Cup 1999 data 2011 http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html
-
(2011)
KDD Cup 1999 Data
-
-
-
36
-
-
33746144908
-
Tmix: A tool for generating realistic TCP application workloads in ns-2
-
DOI 10.1145/1140086.1140094
-
M.C. Weigle, P. Adurthi, F. Hernndez-campos, K. Jeffay, and F.D. Smith Tmix: a tool for generating realistic TCP application workloads in ns-2 Comput Commun Rev 36 2006 65 76 (Pubitemid 44085529)
-
(2006)
Computer Communication Review
, vol.36
, Issue.3
, pp. 65-76
-
-
Weigle, M.C.1
Adurthi, P.2
Hernandez-Campos, F.3
Jeffay, K.4
Smith, F.D.5
-
37
-
-
78249274602
-
Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security
-
C.V. Wright, C. Connelly, T. Braje, J.C. Rabek, L.M. Rossey, and R.K. Cunningham Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security Recent advances in intrusion detection 2010 218 237
-
(2010)
Recent Advances in Intrusion Detection
, pp. 218-237
-
-
Wright, C.V.1
Connelly, C.2
Braje, T.3
Rabek, J.C.4
Rossey, L.M.5
Cunningham, R.K.6
|