-
1
-
-
0029716418
-
A sense of self for Unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes," In Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996.
-
Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
2
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security Vol. 6, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
3
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
IEEE Computer Society Press, Los Alamitos, CA
-
C. Warrender, S. Forrest, and B. Perlmutter, "Detecting intrusions using system calls: Alternative data models," In the Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA, pages 133-145, 1999.
-
(1999)
The Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May)
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Perlmutter, B.3
-
5
-
-
85178282003
-
An introduction to Hidden Markov Models
-
January
-
L. R. Rabiner, and B. H. Juang, "An introduction to Hidden Markov Models", in IEEE ASSP Magazine, January 1996.
-
(1996)
IEEE ASSP Magazine
-
-
Rabiner, L.R.1
Juang, B.H.2
-
8
-
-
84885774862
-
A Framework for Constructing Features and Models for Intrusion Detection Systems
-
November
-
W. Lee, and S. J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," In ACM Transactions on Information and System Security, Vol. 3, No. 4, pages 227-261, November 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
9
-
-
84882800335
-
Simple, state-based approaches to program-based anomaly detection
-
August
-
C. C. Micheal and A. Ghosh, "Simple, state-based approaches to program-based anomaly detection," ACM Transactions on Information and System Security, Vol. 5, No. 3, August 2002, pages 203-237.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 203-237
-
-
Micheal, C.C.1
Ghosh, A.2
-
10
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviours
-
R. Sekar, M. Bendre, Dhurjati, and P. Bullineni, "A fast automaton-based method for detecting anomalous program behaviours," IEEE Symposium on Security and Privacy, 2001. S&P 2001, Page(s): 144-155.
-
IEEE Symposium on Security and Privacy, 2001. S&P 2001
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati3
Bullineni, P.4
-
12
-
-
85178309871
-
-
University of New Mexico's Computer Immune Systems Project, http://www.cs.unm.edu/~immsec/systemcalls.htm.
-
-
-
-
13
-
-
0034976075
-
An agent-based Bayesian forecasting model for enhanced network security
-
J. Pikoulas, W. J. Buchanan, M. Mannion, and K. Triantafyllopoulos, "An agent-based Bayesian forecasting model for enhanced network security," In ECBS 2001 Proceedings on Engineering of Computer Based Systems - the Eighth Annual IEEE International Conference and Workshop, pages 247-254, 2001.
-
(2001)
ECBS 2001 Proceedings on Engineering of Computer Based Systems - The Eighth Annual IEEE International Conference and Workshop
, pp. 247-254
-
-
Pikoulas, J.1
Buchanan, W.J.2
Mannion, M.3
Triantafyllopoulos, K.4
|