-
6
-
-
85036529638
-
Intrusion detection: Applying machine learning to solaris audit data
-
Los Alamitos, CA, December IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ
-
D. Endler. Intrusion detection: Applying machine learning to solaris audit data. In Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98), pages 268-279, Los Alamitos, CA, December 1998. IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ.
-
(1998)
Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98)
, pp. 268-279
-
-
Endler, D.1
-
7
-
-
0029716418
-
A sense of self for Unix processes
-
IEEE Computer Society, IEEE Computer Society Press, May
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy, pages 120-128. IEEE Computer Society, IEEE Computer Society Press, May 1996.
-
(1996)
Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
9
-
-
0004137004
-
-
Cambridge University Press, Cambridge, Mass.
-
D. Gusfield. Algorithms on Strings, Trees, and Sequences. Cambridge University Press, Cambridge, Mass., 1997.
-
(1997)
Algorithms on Strings, Trees, and Sequences
-
-
Gusfield, D.1
-
16
-
-
0027609384
-
A survey of intrusion detection techniques
-
T. Lunt. A survey of intrusion detection techniques. Computers and Security, 12:405-418, 1993.
-
(1993)
Computers and Security
, vol.12
, pp. 405-418
-
-
Lunt, T.1
-
18
-
-
0003451777
-
-
Technical Report, Computer Science Laboratory, SRI Internationnal, February
-
T. Lunt, A. Tamaru, F. Gilham, R. Jagannthan, C. Jalali, H. Javitz, A. Valdos, P. Neumann, and T. Garvey. A real-time intrusion-detection expert system (ides). Technical Report, Computer Science Laboratory, SRI Internationnal, February 1992.
-
(1992)
A Real-time Intrusion-detection Expert System (Ides)
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannthan, R.4
Jalali, C.5
Javitz, H.6
Valdos, A.7
Neumann, P.8
Garvey, T.9
-
19
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length N-grams
-
C. Marceau. Characterizing the behavior of a program using multiple-length N-grams. In Proceedings of the 2000 new security paradigm workshop, pages 101-110, 2000.
-
(2000)
Proceedings of the 2000 New Security Paradigm Workshop
, pp. 101-110
-
-
Marceau, C.1
-
20
-
-
0016942292
-
A space-economic suffix tree construction algorithm
-
Apr.
-
E. M. McCreight. A space-economic suffix tree construction algorithm. Jrnl. A.C.M., 23(2):262-272, Apr. 1976.
-
(1976)
Jrnl. A.C.M.
, vol.23
, Issue.2
, pp. 262-272
-
-
McCreight, E.M.1
-
21
-
-
0035678269
-
Generating software test data by evolution
-
C. C. Michael and G. E. McGraw. Generating software test data by evolution. IEEE TSE, 27(9):1085-1110, 2001.
-
(2001)
IEEE TSE
, vol.27
, Issue.9
, pp. 1085-1110
-
-
Michael, C.C.1
McGraw, G.E.2
-
23
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
IEEE Computer Society
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In Proc. 2000 IEEE Symposium on Security and Privacy, pages 144-155. IEEE Computer Society, 2000.
-
(2000)
Proc. 2000 IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
24
-
-
84877356901
-
Simple and flexible detection of contiguous repeats using a suffix tree
-
Proc. 9th Annual Conference on Combinatorial Pattern Matching, Springer-verlag
-
J. Stoye and D. Gusfield. Simple and flexible detection of contiguous repeats using a suffix tree. In Proc. 9th Annual Conference on Combinatorial Pattern Matching, volume 1448 of Lecture Notes in Computer Science, pages 140-152. Springer-verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1448
, pp. 140-152
-
-
Stoye, J.1
Gusfield, D.2
-
25
-
-
20444449341
-
Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
-
K. M. C. Tan and R. A. Maxion. Why 6? defining the operational limits of stide, an anomaly-based intrusion detector. In IEEE Symposium on Security and Privacy, pages 12-15, 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 12-15
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
26
-
-
0006455454
-
Constructing suffixtreeson-lineinlineartime
-
J. van Leeuwen, editor, Algorithms, Software, Architecture, Amsterdam, The Netherlands, Sept. Elsevier Science Publishers
-
E. Ukkonen. Constructing suffixtreeson-lineinlineartime. In J. van Leeuwen, editor, Proceedings of the IFIP 12th World Computer Congress. Volume 1: Algorithms, Software, Architecture, pages 484-492, Amsterdam, The Netherlands, Sept. 1992. Elsevier Science Publishers.
-
(1992)
Proceedings of the IFIP 12th World Computer Congress
, vol.1
, pp. 484-492
-
-
Ukkonen, E.1
|