-
2
-
-
84937648928
-
-
Restricted Distribution, Department of Computer Science, Purdue University, West Lafayette, IN, April
-
M. Bishop, "Security Problem with the Unix Operating System", [Restricted Distribution], Department of Computer Science, Purdue University, West Lafayette, IN, April 1982.
-
(1982)
Security Problem with the Unix Operating System
-
-
Bishop, M.1
-
3
-
-
85065581574
-
Adaptive real-time anomaly detection using inductively generated sequential patterns
-
Oakland, CA, May
-
K. Chen, S. C. Lu and H. S. Teng, "Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns", Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1989.
-
(1989)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Chen, K.1
Lu, S.C.2
Teng, H.S.3
-
4
-
-
0003893616
-
-
Technical Report, CSL, SRI International, August
-
D. E. Denning and P. G. Neumann, "Requirements and Model for IDES - A Real-time Intrusion Detection Expert System", Technical Report, CSL, SRI International, August 1985.
-
(1985)
Requirements and Model for IDES - A Real-time Intrusion Detection Expert System
-
-
Denning, D.E.1
Neumann, P.G.2
-
5
-
-
84909866474
-
-
Sytek Technical Report TR-85012, Mountain View, CA, October
-
L. R. Halme, T. F. Lunt, J. Van Home, "Analysis of Computer System Audit Trails - Intrusion Classification", Sytek Technical Report TR-85012, Mountain View, CA, October 1985.
-
(1985)
Analysis of Computer System Audit Trails - Intrusion Classification
-
-
Halme, L.R.1
Lunt, T.F.2
Van Home, J.3
-
6
-
-
0344235646
-
-
Trusted Information Systems, Inc., RADC-TR-90-413 Final Technical Report, December
-
B. Hubbard, T. Haley, N. McAuliffe, L. Schaefer, N. Kelem, D. Wolcott, R. Feiertag and M. Schaefer, "Computer System Intrusion Detection", Trusted Information Systems, Inc., RADC-TR-90-413 Final Technical Report, December 1990.
-
(1990)
Computer System Intrusion Detection
-
-
Hubbard, B.1
Haley, T.2
McAuliffe, N.3
Schaefer, L.4
Kelem, N.5
Wolcott, D.6
Feiertag, R.7
Schaefer, M.8
-
7
-
-
0003892692
-
-
Masters Thesis, Computer Science Department, University of California, Santa Barbara, July
-
K. Ilgun, "USTAT: A Real-Time Intrusion Detection System for Unix", Masters Thesis, Computer Science Department, University of California, Santa Barbara, July 1992.
-
(1992)
USTAT: A Real-Time Intrusion Detection System for Unix
-
-
Ilgun, K.1
-
9
-
-
3943093755
-
Real-time intrusion detection
-
San Francisco, CA, February
-
T. F. Lunt, "Real-Time Intrusion Detection", Proceedings COMPCON, San Francisco, CA, February 1989.
-
(1989)
Proceedings COMPCON
-
-
Lunt, T.F.1
-
10
-
-
0024860599
-
Knowledge-based intrusion detection
-
March
-
T. F. Lunt, R. Jagannathan, R. Lee, and A. Whitehurst, "Knowledge-Based Intrusion Detection", Proceeding of the 1989 AI Systems in Government Conference, March 1989.
-
(1989)
Proceeding of the 1989 AI Systems in Government Conference
-
-
Lunt, T.F.1
Jagannathan, R.2
Lee, R.3
Whitehurst, A.4
-
11
-
-
0003451777
-
-
SRI CSL Technical Report, June
-
T. F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, C. Jalai, H. S. Javitz, A. Valdes, and P. G. Neumann, "A Real-Time Intrusion Detection Expert System", SRI CSL Technical Report, SRI-CSL-90-05, June 1990.
-
(1990)
A Real-Time Intrusion Detection Expert System
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalai, C.5
Javitz, H.S.6
Valdes, A.7
Neumann, P.G.8
-
12
-
-
33646029915
-
Is your computer being misused? A survey of current intrusion detection system technology
-
December
-
N. J. McAuliffe, L. J. Schaefer, D. M. Wolcott, T. K. Haley, N. L. Kelem and B. S. Hubbard, "Is Your Computer Being Misused? A Survey of Current Intrusion Detection System Technology", Proceedings of the Sixth Computer Security Applications Conference, December 1990.
-
(1990)
Proceedings of the Sixth Computer Security Applications Conference
-
-
McAuliffe, N.J.1
Schaefer, L.J.2
Wolcott, D.M.3
Haley, T.K.4
Kelem, N.L.5
Hubbard, B.S.6
-
13
-
-
85065579911
-
A requirements oriented analysis of computer misuse detection systems
-
Menlo Park, CA, May
-
B. G. Miller and P. E. Proctor, "A Requirements Oriented Analysis of Computer Misuse Detection Systems", presented at the Seventh Intrusion Detection Workshop, SRI International, Menlo Park, CA, May 1991.
-
(1991)
The Seventh Intrusion Detection Workshop, SRI International
-
-
Miller, B.G.1
Proctor, P.E.2
-
14
-
-
84937646150
-
-
CSL, SRI BN-168, Menlo Park, CA, May
-
P. G. Neumann, "A Comparative Anatomy of Computer System/Network Anomaly Detection Systems", CSL, SRI BN-168, Menlo Park, CA, May 1990.
-
(1990)
A Comparative Anatomy of Computer System/Network Anomaly Detection Systems
-
-
Neumann, P.G.1
-
15
-
-
0004084716
-
-
Masters Thesis, Computer Science Department, University of California, Santa Barbara, June
-
P. A. Porras, "STAT - A State Transition Analysis Tool for Intrusion Detection", Masters Thesis, Computer Science Department, University of California, Santa Barbara, June 1992.
-
(1992)
STAT - A State Transition Analysis Tool for Intrusion Detection
-
-
Porras, P.A.1
-
17
-
-
84941476194
-
-
Virtual VAX-11 Version, Computer Science Division, Department of Electrical and Computer Sciences, University of California, Berkeley, CA, August
-
Unix Programmer's Manual, 4.2 Berkeley Software Distribution, Virtual VAX-11 Version, Computer Science Division, Department of Electrical and Computer Sciences, University of California, Berkeley, CA, August 1983.
-
(1983)
Unix Programmer's Manual, 4.2 Berkeley Software Distribution
-
-
|