-
1
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
6-8 May 1996, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
-
P. D'haeseleer, S. Forrest, and P. Helman. An immunological approach to change detection: algorithms, analysis and implications. In IEEE Symposium on Security and Privacy, 6-8 May 1996, Oakland, California, pages 110-119, IEEE Computer Society Press, Los Alamitos, California. 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 110-119
-
-
D'haeseleer, P.1
Forrest, S.2
Helman, P.3
-
2
-
-
0029716418
-
A sense of self for unix processes
-
6-8 May 1996, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In IEEE Symposium on Security and Privacy, 6-8 May 1996, Oakland, California, pages 120-128,IEEE Computer Society Press, Los Alamitos, California. 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
3
-
-
0027961889
-
Self-nonself discrimination in a computer
-
16-18 May 1994, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
-
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in a computer. In IEEE Symposium on Security and Privacy, 16-18 May 1994, Oakland, California, pages 202-212,IEEE Computer Society Press, Los Alamitos, California, 1994.
-
(1994)
IEEE Symposium on Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
4
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
5
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
14-16 May 2001, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
-
W. Lee and D. Xiang. Information-theoretic measures for anomaly detection. In IEEE Symposium on Security and Privacy, 14-16 May 2001, Oakland, California, pages 130-143, IEEE Computer Society Press, Los Alamitos, California, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
6
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length n-grams
-
18-22 September, Ballycotton, County Cork, Ireland, ACM Press, New York, NY
-
C. Marceau. Characterizing the behavior of a program using multiple-length n-grams. In New Security Paradigms Workshop, 18-22 September 2000, Ballycotton, County Cork, Ireland, pages 101-110, ACM Press, New York, NY, 2001.
-
(2000)
New Security Paradigms Workshop
, pp. 101-110
-
-
Marceau, C.1
-
7
-
-
0034590432
-
Benchmarking anomaly-based detection systems
-
25-28 June 2000, New York, New York, IEEE Computer Society Press, Los Alamitos, California
-
R. A. Maxion and K. M. C. Tan. Benchmarking anomaly-based detection systems. In International Conference on Dependable Systems and Networks, 25-28 June 2000, New York, New York, pages 623-630, IEEE Computer Society Press, Los Alamitos, California, 2000.
-
(2000)
International Conference on Dependable Systems and Networks
, pp. 623-630
-
-
Maxion, R.A.1
Tan, K.M.C.2
-
9
-
-
0002675748
-
Intrusion detection for distributed applications
-
July
-
M. Stillerman, C. Marceau, and M. Stillman. Intrusion detection for distributed applications. Communications of the ACM, 42(7):62-69, July 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 62-69
-
-
Stillerman, M.1
Marceau, C.2
Stillman, M.3
-
12
-
-
84880174811
-
Detecting intrusions using system calls:Alternative data models
-
9-12 May 1999, Oakland, California, IEEE Computer Society Press, Los Alamitos, California
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls:Alternative data models. In IEEE Symposium on Security and Privacy, 9-12 May 1999, Oakland, California, pages 133-145, IEEE Computer Society Press, Los Alamitos, California, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|