-
1
-
-
0000501656
-
Information theory as an extension of the maximum likelihood principle
-
B. N. Petrov and F. Csaksi, editors Budapest, Hungary
-
H. Akaike. Information theory as an extension of the maximum likelihood principle. In B. N. Petrov and F. Csaksi, editors, Proceedings of the 2nd International Symposium on Information Theory, pages 267-281, Budapest, Hungary, 1973.
-
(1973)
Proceedings of the 2nd International Symposium on Information Theory
, pp. 267-281
-
-
Akaike, H.1
-
2
-
-
84942240686
-
Intrusion detection testing and benchmarking methodologies
-
Darmstadt, Germany, March
-
N. Athanasiades, R. Abler, J. Levine, H. Own, and G. Riley. Intrusion detection testing and benchmarking methodologies. In Proceedings of First IEEE International Workshop on Information Assurance, pages 63-72, Darmstadt, Germany, March 2003.
-
(2003)
Proceedings of First IEEE International Workshop on Information Assurance
, pp. 63-72
-
-
Athanasiades, N.1
Abler, R.2
Levine, J.3
Own, H.4
Riley, G.5
-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3): 186-205, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
5
-
-
77953296690
-
More NetFlow tools: For performance and security
-
Atlanta, Georgia, USA, November
-
C. Gates, M. Collins, M. Duggan, A. Kompanek, and M. Thomas. More NetFlow tools: For performance and security. In Proceedings of the 18th Large Installation Systems Administration Conference (LISA 2004), pages 121-132, Atlanta, Georgia, USA, November 2004.
-
(2004)
Proceedings of the 18th Large Installation Systems Administration Conference (LISA 2004)
, pp. 121-132
-
-
Gates, C.1
Collins, M.2
Duggan, M.3
Kompanek, A.4
Thomas, M.5
-
6
-
-
34547284915
-
Scan detection on very large networks using logistic regression modeling
-
Pula-Cagliari, Sardinia, Italy, June
-
C. Gates, J. J. McNutt, J. B. Kadane, and M. Kellner. Scan detection on very large networks using logistic regression modeling. In Proceedings of the IEEE Symposium on Computers and Communications, pages 402-407, Pula-Cagliari, Sardinia, Italy, June 2006.
-
(2006)
Proceedings of the IEEE Symposium on Computers and Communications
, pp. 402-407
-
-
Gates, C.1
McNutt, J.J.2
Kadane, J.B.3
Kellner, M.4
-
7
-
-
84898617166
-
-
Last visited: 1 July 2003
-
Intrusec. Intrusec alert: 55808 trojan analysis. http://www.intrusec.com/ 55808.html, 2003. Last visited: 1 July 2003.
-
(2003)
Intrusec Alert: 55808 Trojan Analysis
-
-
-
8
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R. P. Lippmann et al. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In DARPA Information Survivability Conference and Exposition, Volume 2, pages 12-26, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
-
9
-
-
35248857893
-
An analysis of the 1999 DARPA/lincoln laboratory evaluation data for network anomaly detection
-
Pittsburgh, PA, USA, September
-
M. V. Mahoney and P. K. Chan. An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection, pages 220-237, Pittsburgh, PA, USA, September 2003.
-
(2003)
Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
11
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security, 3(4): 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
12
-
-
14944369649
-
Characteristics of internet background radiation
-
Taormina, Sicily, Italy, October
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of internet background radiation. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pages 27-40, Taormina, Sicily, Italy, October 2004.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
14
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1): 105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
-
15
-
-
0242529347
-
Practical automated detection of stealthy portscans
-
Athens, Greece, November
-
S. Staniford, J. A. Hoagland, and J. M. McAlerney. Practical automated detection of stealthy portscans. In Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 2000.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
16
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
Boston, MA, USA, December USENIX Association
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, pages 255-270, Boston, MA, USA, December 2002. USENIX Association.
-
(2002)
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
|