-
1
-
-
0003964874
-
-
Technical Report SRI-CSL-95-07, Computer Science Laboratory SRI International, Menlo Park, CA 94025-3493, USA May
-
D. Anderson, T. Frivold, and A. Valdes. Next-generation intrusion-detection expert system (NIDES). Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, USA, May 1995
-
(1995)
Next-generation Intrusion-detection Expert System (NIDES)
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
2
-
-
4444324359
-
An approach to UNIX security logging
-
Arlington, Virginia Oct. 5-8. National Institute of Standards and Technology/National Computer Security Center
-
S. Axelsson, U. Lindqvist, U. Gustafson, and E. Jonsson. An approach to UNIX security logging. In Proceedings of the 21st National Information Systems Security Conference, pages 62-75, Arlington, Virginia, Oct. 5-8, 1998. National Institute of Standards and Technology/National Computer Security Center
-
(1998)
Proceedings of the 21st National Information Systems Security Conference
, pp. 62-75
-
-
Axelsson, S.1
Lindqvist, U.2
Gustafson, U.3
Jonsson, E.4
-
3
-
-
84958742099
-
A tool for pro-Active defense against the buffer overrun attack
-
In J.-J. Quisquater et al. editors Louvainla-Neuve, Belgium Sept. 16-18. Springer-Verlag
-
D. Bruschi, E. Rosti, and R. Banfi. A tool for pro-Active defense against the buffer overrun attack. In J.-J. Quisquater et al., editors, Computer Security-Proceedings of ESORICS 98, volume 1485 of LNCS, pages 17-31, Louvainla-Neuve, Belgium, Sept. 16-18, 1998. Springer-Verlag
-
(1998)
Computer Security-Proceedings of ESORICS 98 1485 of LNCS
, pp. 17-31
-
-
Bruschi, D.1
Rosti, E.2
Banfi, R.3
-
4
-
-
0026850007
-
A neural network component for an intrusion detection system
-
Oakland, California, May 4-6, 1992 IEEE Computer Society Press
-
H. Debar, M. Becker, and D. Siboni. A neural network component for an intrusion detection system. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pages 240-250, Oakland, California, May 4-6, 1992. IEEE Computer Society Press
-
Proceedings of the 1992 IEEE Symposium on Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
6
-
-
0003893616
-
-
Technical report, Computer Science Laboratory SRI International, Menlo Park, CA, USA
-
D. E. Denning and P. G. Neumann. Requirements and model for IDES-A real-Time intrusion detection expert system. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, USA, 1985
-
(1985)
Requirements and Model for IDES-A Real-Time Intrusion Detection Expert System
, pp. 94025-103493
-
-
Denning, D.E.1
Neumann, P.G.2
-
7
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, California, May 6-8, 1996 IEEE Computer Society Press
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128, Oakland, California, May 6-8, 1996. IEEE Computer Society Press
-
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
8
-
-
0003685574
-
Model-based intrusion detection
-
Washington, D.C Oct. 1-4. National Institute of Standards and Technology/National Computer Security Center
-
T. D. Garvey and T. F. Lunt. Model-based intrusion detection. In Proceedings of the 14th National Computer Security Conference, pages 372-385, Washington, D.C., Oct. 1-4, 1991. National Institute of Standards and Technology/National Computer Security Center
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 372-385
-
-
Garvey, T.D.1
Lunt, T.F.2
-
9
-
-
84969573885
-
ASAX: Software architecture and rule-based language for universal audit trail analysis
-
In Y. Deswarte et al. editors Toulouse, France Nov. 23-25. Springer-Verlag
-
J. Habra, B. Le Charlier, A. Mounji, and I. Mathieu. ASAX: Software architecture and rule-based language for universal audit trail analysis. In Y. Deswarte et al., editors, Computer Security-Proceedings of ESORICS 92, volume 648 of LNCS, pages 435-450, Toulouse, France, Nov. 23-25, 1992. Springer-Verlag
-
(1992)
Computer Security-Proceedings of ESORICS 92 648 of LNCS
, pp. 435-450
-
-
Habra, J.1
Le Charlier, B.2
Mounji, A.3
Mathieu, I.4
-
10
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Mar
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, Mar. 1995
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
11
-
-
0039952569
-
An expert system application for network intrusion detection
-
Washington, D.C Oct. 1-4. National Institute of Standards and Technology/National Computer Security Center
-
K. A. Jackson, D. H. DuBois, and C. A. Stallings. An expert system application for network intrusion detection. In Proceedings of the 14th National Computer Security Conference, pages 215-225, Washington, D.C., Oct. 1-4, 1991. National Institute of Standards and Technology/National Computer Security Center
-
(1991)
Proceedings of the 14th National Computer Security Conference
, pp. 215-225
-
-
Jackson, K.A.1
DuBois, D.H.2
Stallings, C.A.3
-
12
-
-
0026154682
-
The SRI IDES statistical anomaly detector
-
Oakland, California, May 20-22, 1991IEEE Computer Society Press
-
H. S. Javitz and A. Valdes. The SRI IDES statistical anomaly detector. In Proceedings of the 1991 IEEE Symposium on Security and Privacy, pages 316-326, Oakland, California, May 20-22, 1991. IEEE Computer Society Press
-
Proceedings of the 1991 IEEE Symposium on Security and Privacy
, pp. 316-326
-
-
Javitz, H.S.1
Valdes, A.2
-
14
-
-
0024860599
-
Knowledge-based intrusion detection
-
Washington, D.C Mar. 27-31 IEEE Computer Society Press
-
T. F. Lunt, R. Jagannathan, R. Lee, A. Whitehurst, and S. Listgarten. Knowledge-based intrusion detection. In Proceedings of the Annual AI Systems in Government Conference, pages 102-107, Washington, D.C., Mar. 27-31, 1989. IEEE Computer Society Press
-
(1989)
Proceedings of the Annual AI Systems in Government Conference
, pp. 102-107
-
-
Lunt, T.F.1
Jagannathan, R.2
Lee, R.3
Whitehurst, A.4
Listgarten, S.5
-
15
-
-
84873309550
-
Penetration state transition analysis: A rule-based intrusion detection approach
-
San Antonio, Texas, Nov. 30-Dec IEEE Computer Society Press
-
P. A. Porras and R. A. Kemmerer. Penetration state transition analysis: A rule-based intrusion detection approach. In Proceedings of the Eighth Annual Computer Security Applications Conference, pages 220-229, San Antonio, Texas, Nov. 30-Dec. 4, 1992. IEEE Computer Society Press
-
(1992)
Proceedings of the Eighth Annual Computer Security Applications Conference
, vol.4
, pp. 220-229
-
-
Porras, P.A.1
Kemmerer, R.A.2
-
16
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
San Antonio, Texas, Nov. 30-Dec Oct. 7-10. National Institute of Standards and Technology/National Computer Security Center
-
P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th National Information Systems Security Conference, pages 353-365, Baltimore, Maryland, Oct. 7-10 1997. National Institute of Standards and Technology/National Computer Security Center
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 353-365x
-
-
Porras, P.A.1
Neumann, P.G.2
-
17
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
, Oakland, California, May 4-7, 1997IEEE Computer Society Press
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on TCP. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 208-223, Oakland, California, May 4-7, 1997. IEEE Computer Society Press
-
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
18
-
-
2942645420
-
Expert systems in intrusion detection: A case study
-
Oct. 17-20, Baltimore, Maryland. National Institute of Standards and Technology/National Computer Security Center
-
M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. A. Whitehurst. Expert systems in intrusion detection: A case study. In Proceedings of the 11th National Computer Security Conference, pages 74-81, Baltimore, Maryland, Oct. 17-20, 1988. National Institute of Standards and Technology/National Computer Security Center
-
(1988)
Proceedings of the 11th National Computer Security Conference
, pp. 74-81
-
-
Sebring, M.M.1
Shellhouse, E.2
Hanna, M.E.3
Whitehurst, R.A.4
-
19
-
-
0003951499
-
-
Sun Microsystems Inc., 2550 Garcia Avenue, Mountain View, CA 94043-1100, USA Nov
-
Sun Microsystems, Inc., 2550 Garcia Avenue, Mountain View, CA 94043-1100, USA. SunSHIELD Basic Security Module Guide, Nov. 1995
-
(1995)
SunSHIELD Basic Security Module Guide
-
-
-
20
-
-
0024665277
-
Detection of anomalous computer session activity
-
Oakland, California, May 1-3, 1989IEEE Computer Society Press
-
H. S. Vaccaro and G. E. Liepins. Detection of anomalous computer session activity. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 280-289, Oakland, California, May 1-3, 1989. IEEE Computer Society Press
-
Proceedings of the 1989 IEEE Symposium on Security and Privacy
, pp. 280-289
-
-
Vaccaro, H.S.1
Liepins, G.E.2
|