-
1
-
-
84950123814
-
-
http://www.ipa.go.jp/STC/ida
-
-
-
-
2
-
-
0033075710
-
Information-gathering with mobile agents for an intrusion detection system
-
Feb.
-
M. Asaka, "Information-Gathering with Mobile Agents for an Intrusion Detection System", Systems and Computers in Japan, Vol. 30 No. 2, pp. 31 - pp. 37, Feb. 1999.
-
(1999)
Systems and Computers in Japan
, vol.30
, Issue.2
, pp. 31-37
-
-
Asaka, M.1
-
3
-
-
0001748596
-
Local attack detection and intrusion route tracing
-
Nov.
-
M. Asaka, M. Tsuchiya, T. Onabuta, S. Okazawa, and S. Goto, "Local Attack Detection and Intrusion Route Tracing", IEICE Trans. Commun., Vol. E82-B No. 11, pp. 1826-1833, Nov. 1999.
-
(1999)
IEICE Trans. Commun.
, vol.E82-B
, Issue.11
, pp. 1826-1833
-
-
Asaka, M.1
Tsuchiya, M.2
Onabuta, T.3
Okazawa, S.4
Goto, S.5
-
4
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes", Proc. IEEE Symposium on Computer Security and Privacy, 1996.
-
(1996)
Proc. IEEE Symposium on Computer Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
5
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion detection using sequences of system calls", Computer Security Vol. 6, pp 151-180, 1998.
-
(1998)
Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Somayaji, A.2
Forrest, S.3
-
6
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
Orlando, FL, 5-9 Dec.
-
C. Ko, G. Fink, K. Levitt, "Automated detection of vulnerabilities in privileged programs by execution monitoring". Proc. of the 10th Annual Computer Security Applications Conference, pp. 134-144, Orlando, FL, 5-9 Dec. 1994.
-
(1994)
Proc. of the 10th Annual Computer Security Applications Conference
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
7
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based Approach
-
C. Ko, M. Ruschitzka, and K. Levitt, "Execution monitoring of security-critical programs in distributed systems: a specification-based Approach", Proc. IEEE Symposium on Security and Privacy, pp. 134-144, 1997.
-
(1997)
Proc. IEEE Symposium on Security and Privacy
, pp. 134-144
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
8
-
-
0001474381
-
The statistical utilization of multiple measurements
-
R. A. Fisher, "The Statistical Utilization of Multiple Measurements." Annals of Eugenics, 8 pp. 376-386, 1938.
-
(1938)
Annals of Eugenics
, vol.8
, pp. 376-386
-
-
Fisher, R.A.1
-
10
-
-
84950134887
-
-
http://www.esumi.co.jp
-
-
-
-
11
-
-
0035338003
-
A new intrusion detection method based on discriminant analysis
-
May
-
M. Asaka et al., "A New Intrusion Detection Method Based on Discriminant Analysis", IEICE Trans, on Information & Systems, Vol. E-84-B No. 5, pp. 570-577, May 2001.
-
(2001)
IEICE Trans, on Information & Systems
, vol.E-84-B
, Issue.5
, pp. 570-577
-
-
Asaka, M.1
-
12
-
-
84879799188
-
Estimation of error rate in discriminant analysis
-
P. A. Lachenbruch and M. R. Mickey, "Estimation of Error Rate in Discriminant Analysis." Technometrics, 10, no. 1 pp. 1-10, 1968.
-
(1968)
Technometrics
, vol.10
, Issue.1
, pp. 1-10
-
-
Lachenbruch, P.A.1
Mickey, M.R.2
-
13
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach", IEEE Trans. Software Engineering, Vol. 21, No. 3, pp. 181-199, 1995
-
(1995)
IEEE Trans. Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
15
-
-
0000133998
-
An analysis of transformations
-
G. Box and D. Cox, "An analysis of transformations", J. Royal Statistical Society (B), 26, no. 2 pp. 211-252. 1964
-
(1964)
J. Royal Statistical Society (B)
, vol.26
, Issue.2
, pp. 211-252
-
-
Box, G.1
Cox, D.2
-
16
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning, '"An Intrusion-Detection Model", IEEE Trans. Engineering, Vol. SE-13. No. 2, pp. 222-232, 1987.
-
(1987)
IEEE Trans. Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
17
-
-
0028430224
-
Network intrusion detection
-
May/June
-
B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection", IEEE Network, vol. 8, No. 3, May/June pp. 26-41, 1994
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
|