-
2
-
-
21644478785
-
RACOON: Rapidly Generating User Command Data for Anomaly Detection from Customizable Templates
-
20th Annual Volume, Issue, 6-10 Dec, 2004
-
Chinchani R, Muthukrishnan A, Chandrasekaran M, Upadhyaya S, RACOON: Rapidly Generating User Command Data for Anomaly Detection from Customizable Templates. Computer Security Applications Conference, 2004. 20th Annual Volume, Issue, 6-10 Dec, 2004.
-
(2004)
Computer Security Applications Conference
-
-
Chinchani, R.1
Muthukrishnan, A.2
Chandrasekaran, M.3
Upadhyaya, S.4
-
4
-
-
84886910517
-
A Behavioral Model for Detecting insider Threats
-
McLean, VA
-
Costa P C G, Laskey K B, Revankar M, Mirza S, Alghamdi G, Barbara D, Shackelford T, Wright E J, DTB Project: A Behavioral Model for Detecting insider Threats. International Conference on Intelligence Analysis. McLean, VA, 2005.
-
(2005)
International Conference On Intelligence Analysis
-
-
Costa, P.C.G.1
Laskey, K.B.2
Revankar, M.3
Mirza, S.4
Alghamdi, G.5
Barbara, D.6
Shackelford, T.7
Wright, E.J.8
Project, D.T.B.9
-
9
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Forrest S, Hofmeyer S A, Somayaji A, Longstaff T A, A Sense of Self for Unix Processes. IEEE Symposium on Research in Security and Privacy:120-128, 1996.
-
(1996)
IEEE Symposium On Research In Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyer, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
11
-
-
84882760278
-
User Profiling for Intrusion Detection in Windows NT
-
Goldring T, User Profiling for Intrusion Detection in Windows NT. 35th Symposium on the Interface, 2003.
-
(2003)
35th Symposium On the Interface
-
-
Goldring, T.1
-
13
-
-
84882778490
-
-
A Filtering Approach To Anomaly and Masquerade Detection
-
Jha S, Kruger L, Kurtz T, Lee Y, Smith A, A Filtering Approach To Anomaly and Masquerade Detection, 2004. http://www.people.fas.harvard.edu/~lee48/research/IDS.pdf
-
(2004)
-
-
Jha, S.1
Kruger, L.2
Kurtz, T.3
Lee, Y.4
Smith, A.5
-
15
-
-
0012291134
-
A Hybrid High-Order Markov Chain Model For Computer Intrusion Detection, Technical Report Number 92
-
Ju W-H, Vardi Y, A Hybrid High-Order Markov Chain Model For Computer Intrusion Detection, Technical Report Number 92, National Institute of Statistical Sciences, 1999.
-
(1999)
National Institute of Statistical Sciences
-
-
Ju, W.-H.1
Vardi, Y.2
-
17
-
-
35248817906
-
Use of Support Vector Machine (SVM) In Detecting Anomalous Web Usage Patterns
-
Kim H S, Cho S, Lee Y, Cha S, Use of Support Vector Machine (SVM) In Detecting Anomalous Web Usage Patterns, Symposium on Information and Communications Technology, 2004.
-
(2004)
Symposium On Information and Communications Technology
-
-
Kim, H.S.1
Cho, S.2
Lee, Y.3
Cha, S.4
-
19
-
-
35448953909
-
Detecting Threatening Behavior Using Bayesian Networks
-
Laskey K, Alghamdi G, Wang X, Barabara D, Shackelford T, Wright E, Fitgerald J, Detecting Threatening Behavior Using Bayesian Networks, Proceedings of the Conference on Behavioral Representation in Modeling and Simulation, 2004.
-
(2004)
Proceedings of the Conference On Behavioral Representation In Modeling and Simulation
-
-
Laskey, K.1
Alghamdi, G.2
Wang, X.3
Barabara, D.4
Shackelford, T.5
Wright, E.6
Fitgerald, J.7
-
25
-
-
80052900980
-
Analysis and Detection of Malicious Insiders
-
Maybury M, Chase P, Cheikes B, Brackney D, Matzner S, Hetheringston T, Wood, B, Sibley C, Martin J, Longstaff T, Spitzner L, Haile J, Copeland J, Lewandowski S, Analysis and Detection of Malicious Insiders, International Conference on Intelligence Analysis, 2005.
-
(2005)
International Conference On Intelligence Analysis
-
-
Maybury, M.1
Chase, P.2
Cheikes, B.3
Brackney, D.4
Matzner, S.5
Hetheringston, T.6
Wood, B.7
Sibley, C.8
Martin, J.9
Longstaff, T.10
Spitzner, L.11
Haile, J.12
Copeland, J.13
Lewandowski, S.14
-
27
-
-
84882767622
-
-
Eigen Co-occurrence Matrix Method for Masquerade Detection
-
Oka M, Oyama Y, Kato K, Eigen Co-occurrence Matrix Method for Masquerade Detection, 2004 http://spa.jssst.or.jp/2004/pub/papers/04016.pdf.
-
(2004)
-
-
Oka, M.1
Oyama, Y.2
Kato, K.3
-
28
-
-
35048851006
-
-
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix, RAID
-
Oka M, Oyama Y, Abe H, Kato K, Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix, RAID 2004, 223-237.
-
(2004)
, pp. 223-237
-
-
Oka, M.1
Oyama, Y.2
Abe, H.3
Kato, K.4
-
31
-
-
84882786102
-
-
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
Randazzo M R, Keeney M, Kowalski E, Cappelli D, Moore A, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, 2004.
-
(2004)
-
-
Randazzo, M.R.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
32
-
-
0012282403
-
Computer Intrusion: Detecting Masquerades
-
Schonlau M, DuMouchel W, Ju W-H, Karr A F, Theus M, Vardi Y, Computer Intrusion: Detecting Masquerades. Statistical Science 16:1:58-74, 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
34
-
-
84882775488
-
Selection, Combination, and Evaluation of Effective Software Sensors for Detecting Abnormal Computer Usage
-
Shavlik J, Shavlik M, Selection, Combination, and Evaluation of Effective Software Sensors for Detecting Abnormal Computer Usage, Pentagon Reports, 2004.
-
(2004)
Pentagon Reports
-
-
Shavlik, J.1
Shavlik, M.2
-
35
-
-
0036395373
-
A Framework For Understanding And Predicting Insider Attacks
-
Schultz E E, A Framework For Understanding And Predicting Insider Attacks. Journal of Computers and Security 21:526-531, 2002.
-
(2002)
Journal of Computers and Security
, vol.21
, pp. 526-531
-
-
Schultz, E.E.1
-
37
-
-
27144475340
-
A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection
-
Stolfo S, Apap F, Eskin E, Heller K, Hershkop S, Honig A, Svore K, A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection. Journal of Compauter Security 13:4, 2005.
-
(2005)
Journal of Compauter Security
, vol.13
, Issue.4
-
-
Stolfo, S.1
Apap, F.2
Eskin, E.3
Heller, K.4
Hershkop, S.5
Honig, A.6
Svore, K.7
-
38
-
-
15944400613
-
Recursive Data Mining for Masquerade Detection and Author Identification
-
Szymanski B K, Zhang Y, Recursive Data Mining for Masquerade Detection and Author Identification. Information Assurance Workshop:424-431,2004.
-
(2004)
Information Assurance Workshop
, pp. 424-431
-
-
Szymanski, B.K.1
Zhang, Y.2
-
39
-
-
84880858814
-
Why 6 Defining the Operational Limits of stide, and Anomaly-Based Intrusion Detector
-
Tan K, Maxion R A, "Why 6" Defining the Operational Limits of stide, and Anomaly-Based Intrusion Detector. IEEE Symposium on Security and Privacy, 2002.
-
(2002)
IEEE Symposium On Security and Privacy
-
-
Tan, K.1
Maxion, R.A.2
-
42
-
-
0035402112
-
Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. Systems, Man and Cybernetics
-
Ye N, Li X, Chen Q, Emran S M, Xu M, Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. Systems, Man and Cybernetics, Part A 31:4:266-274, 2001.
-
(2001)
Part a 31:4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
|