-
3
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
USENIX Association, Berkeley
-
Dreger, H., Feldmann, A.,Mai, M., Paxson, V., Sommer, R.: Dynamic application-layer protocol analysis for network intrusion detection. In: Proceedings of the 15th conference on USENIX Security Symposium, vol. 15. USENIX Association, Berkeley (2006)
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
4
-
-
70349791914
-
Creating User Profiles from a Command-Line Interface: A Statistical Approach
-
Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. Springer, Heidelberg
-
Iglesias, J.A., Ledezma, A., Sanchis, A.: Creating User Profiles from a Command-Line Interface: A Statistical Approach. In: Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. LNCS, vol. 5535, pp. 90-101. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5535
, pp. 90-101
-
-
Iglesias, J.A.1
Ledezma, A.2
Sanchis, A.3
-
5
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
ACM, New York
-
Krishnamurthy, B., Sen, S., Zhang, Y., Chen, Y.: Sketch-based change detection: methods, evaluation, and applications. In: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, IMC 2003, pp. 234-247. ACM, New York (2003)
-
(2003)
Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, IMC 2003
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
6
-
-
78149345721
-
Netshield: Massive semantics-based vulnerability signature matching for high-speed networks
-
ACM, New York
-
Li, Z., Xia, G., Gao, H., Tang, Y., Chen, Y., Liu, B., Jiang, J., Lv, Y.: Netshield: massive semantics-based vulnerability signature matching for high-speed networks. In: Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM, SIGCOMM 2010, pp. 279-290. ACM, New York (2010)
-
(2010)
Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM, SIGCOMM 2010
, pp. 279-290
-
-
Li, Z.1
Xia, G.2
Gao, H.3
Tang, Y.4
Chen, Y.5
Liu, B.6
Jiang, J.7
Lv, Y.8
-
7
-
-
0343302295
-
-
Tech. rep., SRI International, 333 Ravenswood Avenue, Menlo Park
-
Lunt, T.F., Jagannathan, R., Lee, R., Listgarten, S., Edwards, D.L., Neumann, P.G., Javitz, H.S., Valdes, A., Lunt, T.F., Jagannathan, R., Lee, R., Listgarten, S., Edwards, D.L., Neumann, P.G., Javitz, H.S., Valdes, A.: Ides: The enhanced prototype - a real-time intrusiondetection expert system. Tech. rep., SRI International, 333 Ravenswood Avenue, Menlo Park (1988)
-
(1988)
Ides: The Enhanced Prototype - A Real-time Intrusiondetection Expert System
-
-
Lunt, T.F.1
Jagannathan, R.2
Lee, R.3
Listgarten, S.4
Edwards, D.L.5
Neumann, P.G.6
Javitz, H.S.7
Valdes, A.8
Lunt, T.F.9
Jagannathan, R.10
Lee, R.11
Listgarten, S.12
Edwards, D.L.13
Neumann, P.G.14
Javitz, H.S.15
Valdes, A.16
-
8
-
-
78149460823
-
Detecting intrusions through system call sequence and argument analysis
-
Maggi, F., Matteucci, M., Zanero, S.: Detecting intrusions through system call sequence and argument analysis. IEEE Transactions on Dependable and Secure Computing 7, 381-395 (2010)
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, pp. 381-395
-
-
Maggi, F.1
Matteucci, M.2
Zanero, S.3
-
11
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31, 2435-2463 (1999)
-
(1999)
Comput. Netw.
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
12
-
-
0003535506
-
-
Rigney, C.,Willens, S., Rubens, A., Simpson,W.: Remote authentication dial in user service, radius (2000)
-
(2000)
Remote Authentication Dial in User Service, Radius
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
13
-
-
85180537732
-
Effective Anomaly Detection with Scarce Training Data
-
Robertson, W., Maggi, F., Kruegel, C., Vigna, G.: Effective Anomaly Detection with Scarce Training Data. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2010)
-
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2010)
-
-
Robertson, W.1
Maggi, F.2
Kruegel, C.3
Vigna, G.4
-
15
-
-
84867893290
-
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection
-
Salem, M.B., Stolfo, S.J.: A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection. Security and Communication Networks (2011)
-
(2011)
Security and Communication Networks
-
-
Salem, M.B.1
Stolfo, S.J.2
-
16
-
-
85180633963
-
Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic
-
The Internet Society
-
Song, Y., Keromytis, A.D., Stolfo, S.J.: Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic. In: NDSS. The Internet Society (2009)
-
(2009)
NDSS
-
-
Song, Y.1
Keromytis, A.D.2
Stolfo, S.J.3
-
18
-
-
33846307457
-
Graphical passwords: A survey
-
IEEE Computer Society, Washington, DC
-
Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: A survey. In: Proceedings of the 21st Annual Computer Security Applications Conference, pp. 463-472. IEEE Computer Society, Washington, DC (2005)
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 463-472
-
-
Suo, X.1
Zhu, Y.2
Owen, G.S.3
|