-
1
-
-
84944721192
-
Log correlation for intrusion detection: A proof of concept
-
IEEE Computer Society
-
Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, and Kenneth E. Rowe. Log correlation for intrusion detection: A proof of concept. In ACSAC, pages 255-264. IEEE Computer Society, 2003.
-
(2003)
ACSAC
, pp. 255-264
-
-
Abad, C.1
Taylor, J.2
Sengul, C.3
Yurcik, W.4
Zhou, Y.5
Rowe, K.E.6
-
2
-
-
21644443181
-
Extracting attack manifestations to determine log data requirements for intrusion detection
-
Emilie Lundin Barse and Erland Jonsson. Extracting attack manifestations to determine log data requirements for intrusion detection. In ACSAC, pages 158-167, 2004.
-
(2004)
ACSAC
, pp. 158-167
-
-
Barse, E.L.1
Jonsson, E.2
-
3
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
ACM
-
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In WWW, pages 551-560. ACM, 2009.
-
(2009)
WWW
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
6
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
Pedro Garcia-Teodoro et al. Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1-2):18-28, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
-
7
-
-
72049095903
-
A data correlation method for anomaly detection systems using regression relations
-
A. Hassanzadeh and B. Sadeghiyan. A data correlation method for anomaly detection systems using regression relations. In ICFIN, pages 242-248, 2009.
-
(2009)
ICFIN
, pp. 242-248
-
-
Hassanzadeh, A.1
Sadeghiyan, B.2
-
8
-
-
2442509056
-
Decentralized event correlation for intrusion detection
-
Christopher Kruegel, Thomas Toth, and Clemens Kerer. Decentralized event correlation for intrusion detection. In ICISC, pages 59-95. 2002.
-
(2002)
ICISC
, pp. 59-95
-
-
Kruegel, C.1
Toth, T.2
Kerer, C.3
-
9
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
SIAM
-
Aleksandar Lazarevic, Levent Ertöz, Vipin Kumar, Aysel Ozgur, and Jaideep Srivastava. A comparative study of anomaly detection schemes in network intrusion detection. In SDM. SIAM, 2003.
-
(2003)
SDM
-
-
Lazarevic, A.1
Ertöz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
10
-
-
84956982801
-
Learning fingerprints for a database intrusion detection system
-
Springer
-
Sin Yeung Lee, Wai Lup Low, and Pei Yuen Wong. Learning fingerprints for a database intrusion detection system. In ESORICS, pages 264-280. Springer, 2002.
-
(2002)
ESORICS
, pp. 264-280
-
-
Lee, S.Y.1
Low, W.L.2
Wong, P.Y.3
-
11
-
-
33845387429
-
Uclog: A unified, correlated logging architecture for intrusion detection
-
Zhenmin Li, Jed Taylor, Elizabeth Partridge, Yuanyuan Zhou, William Yurcik, Cristina Abad, James J. Barlow, and Jeff Rosendale. Uclog: A unified, correlated logging architecture for intrusion detection. In ICTSM, 2004.
-
(2004)
ICTSM
-
-
Li, Z.1
Taylor, J.2
Partridge, E.3
Zhou, Y.4
Yurcik, W.5
Abad, C.6
Barlow, J.J.7
Rosendale, J.8
-
12
-
-
38549107133
-
Comparison of probabilistic boolean network and dynamic Bayesian network approaches for inferring gene regulatory networks
-
Peng Li, Chaoyang Zhang, Edward J. Perkins, Ping Gong, and Youping Deng. Comparison of probabilistic boolean network and dynamic bayesian network approaches for inferring gene regulatory networks. BMC Bioinformatics, 8(S-7), 2007.
-
(2007)
BMC Bioinformatics
, vol.8
, Issue.S7
-
-
Li, P.1
Zhang, C.2
Perkins, E.J.3
Gong, P.4
Deng, Y.5
-
13
-
-
0028430224
-
Network intrusion detection
-
Biswanath Mukherjee, L. Todd Heberlein, and Karl N. Levitt. Network intrusion detection. IEEE Network, 8(3):26-41, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Todd Heberlein, L.2
Levitt, K.N.3
-
15
-
-
84867677727
-
Designing a cyber attack information system for national situational awareness
-
Florian Skopik, Zhendong Ma, Paul Smith, and Thomas Bleier. Designing a cyber attack information system for national situational awareness. In Future Security, pages 277-288, 2012.
-
(2012)
Future Security
, pp. 277-288
-
-
Skopik, F.1
Ma, Z.2
Smith, P.3
Bleier, T.4
|