-
2
-
-
0038223829
-
Intrusion detection systems (IDS)
-
National Institute of Standards and Technology (NIST), 2001
-
Rebecca Bace and Peter Mell. Intrusion detection systems (IDS). Technical Report SP 800-31, National Institute of Standards and Technology (NIST), 2001 2001.
-
(2001)
Technical Report SP 800-31
-
-
Bace, R.1
Mell, P.2
-
4
-
-
3042637621
-
Towards proactive computer-system forensics
-
IEEE Computer Society
-
Phillip G. Bradford, Marcus Brown, Josh Perdue, and Bonnie Self. Towards proactive computer-system forensics. In International Conference on Information Technology: Coding and Computing (ITCC 2004), pages 648 - 652. IEEE Computer Society, 2004.
-
(2004)
International Conference on Information Technology: Coding and Computing (ITCC 2004)
, pp. 648-652
-
-
Bradford, P.G.1
Brown, M.2
Perdue, J.3
Self, B.4
-
5
-
-
56749093226
-
Insider threat detection using situation-aware mas
-
Cologne, Germany, ,. IEEE Xplore
-
John F. Buford, Lundy Lewis, and Gabriel Jakobson. Insider threat detection using situation-aware MAS. In 11th International Conference on Information Fusion, pages 1-8, Cologne, Germany, 2008. IEEE Xplore.
-
(2008)
11th International Conference on Information Fusion
, pp. 1-8
-
-
Buford, J.F.1
Lewis, L.2
Jakobson, G.3
-
6
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Srilatha Chebrolua, Ajith Abrahama, and Johnson P. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers and Security, 24(4):295-307, 2004.
-
(2004)
Computers and Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolua, S.1
Abrahama, A.2
Thomas, J.P.3
-
9
-
-
77949545382
-
TJX breach was twice as big as admitted, banks say
-
24 October
-
Dan Goodin. TJX breach was twice as big as admitted, banks say. The Register, 24 October 2007.
-
(2007)
The Register
-
-
Goodin, D.1
-
10
-
-
84866633841
-
Tactical operations and strategic intelligence: Sensor purpose and placement
-
9 September 2002
-
Todd Heberlein. Tactical operations and strategic intelligence: Sensor purpose and placement. Technical Report TR-2002-04.02, Net Squared, Inc., 9 September 2002 2002.
-
(2002)
Technical Report TR-2002-04.02, Net Squared, Inc
-
-
Heberlein, T.1
-
11
-
-
33745444138
-
Detecting insider threats by monitoring system call activity
-
United States Military Academy, West Point, IEEE Computer Society
-
Nam Nguyen, Peter Reiher, and Geoffrey H. Kuenning. Detecting insider threats by monitoring system call activity. In 2003 IEEE Workshop on Information Assurance, pages 18-20, United States Military Academy, West Point, 2003. IEEE Computer Society.
-
(2003)
2003 IEEE Workshop on Information Assurance
, pp. 18-20
-
-
Nguyen, N.1
Reiher, P.2
Kuenning, G.H.3
-
12
-
-
84874839574
-
U.S. Secret service and cert coordination center/sei insider threat study: Illicit cyber activity in the banking and finance sector
-
Carnegie Mellon University, August
-
Marisa Reddy Randazzo, Dawn Cappelli, Michelle Keeney, Andrew Moore, and Eileen Kowalski. U.S. secret service and CERT coordination center/SEI insider threat study: Illicit cyber activity in the banking and finance sector. Technical report, Software Engineering Institute, Carnegie Mellon University, August 2004.
-
(2004)
Technical Report, Software Engineering Institute
-
-
Randazzo, M.R.1
Cappelli, D.2
Keeney, M.3
Moore, A.4
Kowalski, E.5
-
14
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
Stuart Staniford, James A. Hoagland, and Joseph M. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2):105- 136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
Mcalerney, J.M.3
|