메뉴 건너뛰기




Volumn 1907, Issue , 2000, Pages 197-216

LAMBDA: A language to model a database for detection of attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME;

EID: 84944201343     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-39945-3_13     Document Type: Conference Paper
Times cited : (181)

References (14)
  • 2
    • 84944197578 scopus 로고    scopus 로고
    • Intrusion Detection Exchange Format Data Model
    • draft-ietf-idwg-data-model-02.txt, IDWG, Internet Engineering Task Force, March 7, work in progress
    • Debar, H., Huang, M. and Donahoo, D., “Intrusion Detection Exchange Format Data Model”, draft-ietf-idwg-data-model-02.txt, Internet Draft, IDWG, Internet Engineering Task Force, March 7, 2000, work in progress. 197, 201
    • (2000) Internet Draft , vol.197 , pp. 201
    • Debar, H.1    Huang, M.2    Donahoo, D.3
  • 3
    • 84944264194 scopus 로고    scopus 로고
    • Intrusion Detection Message Exchange Requirements
    • draft-ietf-idwgrequirements- 02.txt, October 21, work in progress
    • Wood, M., “Intrusion Detection Message Exchange Requirements”, draft-ietf-idwgrequirements- 02.txt, Internet Draft, IDWG, Internet Engineering Task Force, October 21, 1999, work in progress. 197, 201, 205
    • (1999) Internet Draft , vol.197 , Issue.201 , pp. 205
    • Wood, M.1
  • 4
    • 0004225165 scopus 로고    scopus 로고
    • Intrusion Detection Message Exchange Format Extensible Markup Language (XML) Document Type Definition”
    • draft-ietf-idwg-idmef-xml-01.tx
    • Curry, D., “Intrusion Detection Message Exchange Format Extensible Markup Language (XML) Document Type Definition”, draft-ietf-idwg-idmef-xml-01.txt, Internet Draft, IDWG, Internet Engineering Task Force, March 15, 2000, work in progress. 197, 205
    • (2000) Internet Draft , vol.197 , pp. 205
    • Curry, D.1
  • 5
    • 0038289826 scopus 로고
    • Technical report, Programming Systems Research Group, Lab. for Computer Science, MIT
    • W. Baldwin Robert, Su-Kuang: Rule-based Security Checking, Technical report, Programming Systems Research Group, Lab. for Computer Science, MIT, May 1994. 202, 215
    • (1994) Su-Kuang: Rule-Based Security Checking , vol.202 , pp. 215
    • Baldwin Robert, W.1
  • 6
    • 85084161252 scopus 로고    scopus 로고
    • NetKuang – a Multi-Host Configuration Vulnerability Checke
    • San Jose, CA, USA, July
    • Zerkle, D. and Levitt, K., “NetKuang – a Multi-Host Configuration Vulnerability Checker”, in 6th USENIX Security Symposium, San Jose, CA, USA, July 1996. 202, 215
    • (1996) 6Th USENIX Security Symposium , vol.202 , pp. 215
    • Zerkle, D.1    Levitt, K.2
  • 8
    • 0006752079 scopus 로고
    • Variants of the event calculus
    • M IT Press
    • Sadri, F. and Kowalski, R., “Variants of the event calculus”, Proc. of ICLP, M IT Press, 1995. 203, 204
    • (1995) Proc. Of ICLP , vol.203 , pp. 204
    • Sadri, F.1    Kowalski, R.2
  • 11
    • 0027150412 scopus 로고
    • USTAT: A real-time intrusion detection system for Unix
    • Ilgun, K., “USTAT: A real-time intrusion detection system for Unix”, in IEEE Symposium on Security and Privacy, pp. 16-29, 1993. 215
    • (1993) IEEE Symposium on Security and Privacy , pp. 16-29
    • Ilgun, K.1
  • 12
    • 0003518833 scopus 로고
    • Ph.D. thesis, Department of Computer Science, Purdue University, West Lafayette, IN, USA
    • Sandeep Kumar, Classification and Detection of Computer Intrusion, Ph.D. thesis, Department of Computer Science, Purdue University, West Lafayette, IN, USA, August 1995. 215
    • (1995) Classification and Detection of Computer Intrusion , pp. 215
    • Kumar, S.1
  • 13
    • 84944236165 scopus 로고    scopus 로고
    • Teresa Lunt, “IDES: An intelligent system for detecting intruders”, in Computer Security, Threats and Countermeasures, November 1990. 215
    • Lunt, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.