-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
Fort Washington, Pa
-
anderson, J. 1980. Computer security threat monitoring and surveillance. Tech. Rep. James P. anderson Co., Fort Washington, Pa.
-
(1980)
Tech. Rep. James P. anderson Co.
-
-
anderson, J.1
-
2
-
-
52949142573
-
-
Prentice-Hall, Inc., Englewood Cliffs, N.J
-
Basseville, M. and Nikiforov, I. V. 1993. Detection of Abrupt Changes-Theory and Application. Prentice-Hall, Inc., Englewood Cliffs, N.J.
-
(1993)
Detection of Abrupt Changes-Theory and Application.
-
-
Basseville, M.1
Nikiforov, I.V.2
-
4
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
IEEE Computer Society Press, Los Alamitos, Calif
-
D'Haeseleer, P., Forrest, S., and Helman, P. 1996. An immunological approach to change detection: Algorithms, analysis and implications. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy.
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
5
-
-
85036529638
-
Intrusion detection: Applying machine learning to solaris audit data
-
(Scottsdale, Az.). IEEE Computer Society Press, Los Alamitos, Calif
-
Endler, D. 1998. Intrusion detection: Applying machine learning to solaris audit data. In Proceedings of the 1998Annual Computer Security Applications Conference (ACSAC'98). (Scottsdale, Az.). IEEE Computer Society Press, Los Alamitos, Calif., 268-279.
-
(1998)
Proceedings of the 1998Annual Computer Security Applications Conference (ACSAC'98).
, pp. 268-279
-
-
Endler, D.1
-
6
-
-
0029716418
-
A sense of self for Unix processes
-
IEEE Computer Society Press, Los Alamitos, Calif
-
Forrest, S., Hofmeyr, S. A., Somayaji, A., and Longstaff, T. A. 1996. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy.
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
7
-
-
0002023197
-
Efficient learning of typical finite automata from random walks
-
(10 Oct.)
-
Freund, Y., Kearns, M., Ron, D., Rubinfeld, R., Schapire, R. E., and Sellie, L. 1997. Efficient learning of typical finite automata from random walks. Inf. Comput. 138, 1 (10 Oct.), 23-48.
-
(1997)
Inf. Comput.
, vol.138
, pp. 23-48
-
-
Freund, Y.1
Kearns, M.2
Ron, D.3
Rubinfeld, R.4
Schapire, R.E.5
Sellie, L.6
-
8
-
-
80052007699
-
A real-time intrusion detection system based on learning program behavior
-
H. Debar, L. Me, and F. Wu, Eds. Lecture Notes in Computer Science Springer, Berlin
-
Ghosh, A., Michael, C. C., and Schatz, M. 2000. A real-time intrusion detection system based on learning program behavior. In Recent Advances in Intrusion Detection; Third International Workshop. H. Debar, L. Me, and F. Wu, Eds. Lecture Notes in Computer Science, vol. 1907. Springer, Berlin, 93-109.
-
(2000)
Recent Advances in Intrusion Detection; Third International Workshop.
, vol.1907
, pp. 93-109
-
-
Ghosh, A.1
Michael, C.C.2
Schatz, M.3
-
13
-
-
84988573115
-
The design and implementation of tripwire: A file system integrity checker
-
J. Stern, Ed. (Fairfax, Va.). ACM, New York
-
Kim, G. H. and Spafford, E. H. 1994. The design and implementation of tripwire: A file system integrity checker. In Proceedings of the 2nd ACM Conference on Computer and Communications Security. J. Stern, Ed. (Fairfax, Va.). ACM, New York, 18-29.
-
(1994)
Proceedings of the 2nd ACM Conference on Computer and Communications Security.
, pp. 18-29
-
-
Kim, G.H.1
Spafford, E.H.2
-
14
-
-
0031233430
-
Intrusion detection via system call traces
-
(Sept./Oct.)
-
Kosoresow, A. P. and Hofmeyr, S. A. 1997. Intrusion detection via system call traces. IEEE Softw. 14, 5 (Sept./Oct.), 24-42.
-
(1997)
IEEE Softw.
, vol.14
, pp. 24-42
-
-
Kosoresow, A.P.1
Hofmeyr, S.A.2
-
15
-
-
0032202049
-
Information bounds and quick detection of parameter changes in stochastic systems
-
LAI, T. L. 1998. Information bounds and quick detection of parameter changes in stochastic systems. IEEE Trans. Inf. Theory 44, 7, 2917-2929.
-
(1998)
IEEE Trans. Inf. Theory 44
, vol.7
, pp. 2917-2929
-
-
LAI, T.L.1
-
17
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
Lane, T. and Brodley, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Sec. 2, 3, 295-331.
-
(1999)
ACM Trans. Inf. Syst. Sec.
, vol.2
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
18
-
-
84947908042
-
Results of the abbadingo one dfa learning competition and a new evidence driven state merging algorithm
-
Lecture Notes in Artificial Intelligence Springer-Verlag, New York
-
Lang, K., Pearlmutter, B., and PRICE, R. 1998. Results of the abbadingo one dfa learning competition and a new evidence driven state merging algorithm. In Proceedings of the International Colloquium on Grammatical Inference (ICGA-98). Lecture Notes in Artificial Intelligence, vol. 1433. Springer-Verlag, New York, 1-12.
-
(1998)
Proceedings of the International Colloquium on Grammatical Inference (ICGA-98).
, vol.1433
, pp. 1-12
-
-
Lang, K.1
Pearlmutter, B.2
PRICE, R.3
-
21
-
-
0027609384
-
A survey of intrusion detection techniques
-
Lunt, T. 1993. A survey of intrusion detection techniques. Comput. Sec. 12,405-418.
-
(1993)
Comput. Sec.
, vol.12
, pp. 405-418
-
-
Lunt, T.1
-
23
-
-
0003451777
-
-
Computer Science Laboratory, SRI Internationnal
-
Lunt, T., Tamaru, A., Gilham, F., Jagannthan, R., Jalali, C., Javitz, H., Valdos, A., Neumann, P., and Garvey, T. 1992. A real-time intrusion-detection expert system (ides). Tech. Rep. Computer Science Laboratory, SRI Internationnal.
-
(1992)
A real-time intrusion-detection expert system (ides). Tech. Rep.
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannthan, R.4
Jalali, C.5
Javitz, H.6
Valdos, A.7
Neumann, P.8
Garvey, T.9
-
24
-
-
33947272541
-
Two state-based approaches to program-based anomaly detection
-
Michael, C. C. and GHOSH, A. 2000. Two state-based approaches to program-based anomaly detection. In Proceedings ofACSAC 2000. 21-30.
-
(2000)
Proceedings ofACSAC 2000
, pp. 21-30
-
-
Michael, C.C.1
GHOSH, A.2
-
27
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
IEEE Computer Society, Los Alamitos, Calif
-
Sekar, R., Bendre, M., Dhurjati, D., and Bollineni, P. 2000. A fast automaton-based method for detecting anomalous program behaviors. In Proceedings ofthe 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, Calif., 144-155.
-
(2000)
Proceedings ofthe 2000 IEEE Symposium on Security and Privacy.
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
28
-
-
0000949239
-
GrIDS-A graph based intrusion detection system for large networks
-
Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yip, R., and Zerkle, D. 1996. GrIDS-A graph based intrusion detection system for large networks. In Proceedings ofthe 19th National Information Systems Security Conference.
-
(1996)
Proceedings ofthe 19th National Information Systems Security Conference
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
30
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
IEEE Computer Society Press, Los Alamitos, Calif
-
Warrender, C., Forrest, S., and Pearlmutter, B. 1999. Detecting intrusions using system calls: Alternative data models. In Proceedings ofthe 1999 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., 133-145.
-
(1999)
Proceedings ofthe 1999 IEEE Symposium on Security and Privacy.
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|