-
1
-
-
4444324359
-
An approach to UNIX security logging
-
In Proceedings of the 21st NIST-NCSC National Conference on Information Systems Security (Crystal City, Arlington, VA, Oct. 5-8). National Institute of Standards and Technology, Gaithersburg, MD
-
Axelsson, S., Lindqvist, U., Gustafson, U., and Jonsson, E. 1998. An approach to UNIX security logging. In Proceedings of the 21st NIST-NCSC National Conference on Information Systems Security (Crystal City, Arlington, VA, Oct. 5-8). National Institute of Standards and Technology, Gaithersburg, MD, 62-75
-
(1998)
, pp. 62-75
-
-
Axelsson, S.1
Lindqvist, U.2
Gustafson, U.3
Jonsson, E.4
-
2
-
-
0007243881
-
Auditory and other sensory forms of information
-
Navy, Air Force, H. Van Cott and R. Kinkade, Eds
-
Deatherage, B. H. 1972. Auditory and other sensory forms of information. In Human Engineering Guide to Equipment Design: Army, Navy, Air Force, H. Van Cott and R. Kinkade, Eds
-
(1972)
Human Engineering Guide to Equipment Design: Army
-
-
Deatherage, B.H.1
-
3
-
-
0026850007
-
A neural network component for an intrusion detection system
-
IEEE Computer Society Press, Los Alamitos, CA
-
Debar, H., Becker, M., and Siboni, D. 1992. A neural network component for an intrusion detection system. In Proceedings of the ACM/IEEE Symposium on Research in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 240-250
-
(1992)
Proceedings of the ACM/IEEE Symposium on Research in Security and Privacy (Oakland, CA, May)
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
4
-
-
0023294428
-
An intrusion-detection model
-
(Feb.)
-
Denning, D.E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13, 2 (Feb.), 222-232
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
, pp. 222-232
-
-
Denning, D.E.1
-
6
-
-
85024248175
-
Building a security monitor with adaptive user work profiles
-
In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD
-
Halme, L. and Kahn, B. 1988. Building a security monitor with adaptive user work profiles. In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD.
-
(1988)
-
-
Halme, L.1
Kahn, B.2
-
7
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
(Sept.)
-
Helman, P. and Liepins, G. 1993. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans. Softw. Eng. 19, 9 (Sept.), 886-901
-
(1993)
IEEE Trans. Softw. Eng.
, vol.19
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
8
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
Lane, T. and Brodley, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Secur. 2, 3, 295-331
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
9
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA
-
Lee, W. 1999. A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 120-132
-
(1999)
, pp. 120-132
-
-
Lee, W.1
-
10
-
-
84962260018
-
Evaluating intrusion detection systems: The DARPA off-line intrusion detection evaluation
-
(DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA
-
Lippmann, R. P., Fried, D., Graf, I., et al. 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA, 12-26
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.2
Graf, I.3
-
11
-
-
0003111439
-
Automated audit trail analysis and intrusion detection
-
In Proceedings of the on 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD
-
Lunt, T. F. 1988. Automated audit trail analysis and intrusion detection. In Proceedings of the on 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 65-73
-
(1988)
, pp. 65-73
-
-
Lunt, T.F.1
-
12
-
-
85024291104
-
Base-rate errors and rain forecasts
-
Matthews, R. 1996. Base-rate errors and rain forecasts. Nature 382, 6594-6766
-
(1996)
Nature
, vol.382
, pp. 6594-6766
-
-
Matthews, R.1
-
13
-
-
0031430904
-
Decision-theoretic limits on earthquake prediction
-
(Dec.)
-
Matthews, R. 1997. Decision-theoretic limits on earthquake prediction. Geophys. J. Int. 131, 3 (Dec.), 526-529
-
(1997)
Geophys. J. Int.
, vol.131
, pp. 526-529
-
-
Matthews, R.1
-
14
-
-
0003700691
-
Testing intrusion detection systems: A critique of the 1998 and 1999 Lincoln Laboratory evaluations
-
Mchugh, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 Lincoln Laboratory evaluations. ACM Trans. Inf. Syst. Secur. 3
-
(2000)
ACM Trans. Inf. Syst. Secur
, pp. 3
-
-
Mchugh, J.1
-
15
-
-
85024284090
-
-
incendiaries and sabotage: Field training manual, Fleet Marine Force, US Marine Corps
-
Pierce, G. M. 1943. Destruction by demolition, incendiaries and sabotage: Field training manual, Fleet Marine Force, US Marine Corps
-
(1943)
Destruction by demolition
-
-
Pierce, G.M.1
-
16
-
-
84877340108
-
Information Processing and Human-Machine Interaction: An Approach to Cognitive Engineering
-
Co.
-
Rasmussen, J. 1986. Information Processing and Human-Machine Interaction: An Approach to Cognitive Engineering. North-Holland Publishing Co., Amsterdam, The Netherlands
-
(1986)
North-Holland Publishing
-
-
Rasmussen, J.1
-
17
-
-
0003584577
-
Artificial intelligence: a modern approach
-
Prentice-Hall, Inc., Upper Saddle River, NJ
-
Russell, S. J. and Norvig, P. 1995. Artificial intelligence: a modern approach. Prentice-Hall series in artificial intelligence. Prentice-Hall, Inc., Upper Saddle River, NJ
-
(1995)
Prentice-Hall series in artificial intelligence
-
-
Russell, S.J.1
Norvig, P.2
-
18
-
-
2942645420
-
Expert systems in intrusion detection: A case study
-
In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD
-
Sebring, M. M., Shellhouse, E., Hanna, M. E., and Whitehurst, R. A. 1988. Expert systems in intrusion detection: A case study. In Proceedings of the 11th National Computer Security Conference (NIST-NCSC, Baltimore, Maryland, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD, 74-81
-
(1988)
, pp. 74-81
-
-
Sebring, M.M.1
Shellhouse, E.2
Hanna, M.E.3
Whitehurst, R.A.4
-
19
-
-
0003462953
-
Detection, Estimation, and Modulation Theory, Part I: Detection, Estimation, and Linear Modulation Theory
-
John Wiley and Sons, Inc., New York, NY
-
Trees, H. L. V. 1968. Detection, Estimation, and Modulation Theory, Part I: Detection, Estimation, and Linear Modulation Theory. John Wiley and Sons, Inc., New York, NY
-
(1968)
-
-
Trees, H.L.V.1
-
20
-
-
0024665277
-
Detection of anomalous computer session activity
-
In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA
-
Vaccaro, H. S. and Liepins, G. E. 1989. Detection of anomalous computer session activity. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA, 280-289
-
(1989)
, pp. 280-289
-
-
Vaccaro, H.S.1
Liepins, G.E.2
-
21
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA
-
Warrender, C., Forrest, S., and Perlmutter, B. 1999. Detecting intrusions using system calls: Alternative data models. In Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy (Berkeley, CA, May). IEEE Computer Society Press, Los Alamitos, CA, 133-145
-
(1999)
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Perlmutter, B.3
-
22
-
-
0003636986
-
Engineering Psychology and Human Performance
-
2nd ed. HarperCollins Publishers, New York, NY
-
Wickens, C. 1992. Engineering Psychology and Human Performance. 2nd ed. HarperCollins Publishers, New York, NY
-
(1992)
-
-
Wickens, C.1
|