-
1
-
-
0004048154
-
-
tech. rep., James P. Anderson Co., Fort Washington, PA Apr
-
J. P. Anderson, "Computer security threat monitoring and surveillance, " tech. rep., James P. Anderson Co., Fort Washington, PA, Apr. 1980.
-
(1980)
Computer Security Threat Monitoring and Surveillance
-
-
Anderson, J.P.1
-
3
-
-
30244559429
-
Intrusion detection: A survey
-
21-24 August, (Seoul, Korea) , Sponsored by International Council for Computer Communication
-
M. Esmaili, R. Safavi-Naini, and J. Pieprzyk, "Intrusion detection: A survey, " in Proceedings of Twelfth International Conference on Computer CommunicationICCC95, vol. 1, (Seoul, Korea), pp. 409-414, 21-24 August 1995. Sponsored by International Council for Computer Communication.
-
(1995)
Proceedings of Twelfth International Conference on Computer CommunicationICCC95
, vol.1
, pp. 409-414
-
-
Esmaili, M.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
4
-
-
0003893616
-
-
tech, rep., CSL SRI International
-
D. E. Denning and P. G. Neumann, "Requirements and models for IDES-A real-Time intrusion detection system, " tech, rep., CSL, SRI International, 1985.
-
(1985)
Requirements and Models for IDES-A Real-Time Intrusion Detection System
-
-
Denning, D.E.1
Neumann, P.G.2
-
6
-
-
1842709394
-
IDES: An intelligent system for detecting intruders
-
November
-
T. F. Lunt, "IDES: An intelligent system for detecting intruders, " in Proceedings of the Symposium: Computer Security, Threat and Countermeasures, (Rome, Italy), November 1990.
-
(1990)
Proceedings of the Symposium: Computer Security, Threat and Countermeasures, (Rome, Italy)
-
-
Lunt, T.F.1
-
7
-
-
0344235646
-
-
Tech. Rep. RADC-TR-90-413, Final Technical Report, Trusted Information Systems, Inc Dec
-
B. Hubbards, T. Haley, N. McAuliffe, L. Schaefer, N. Kelem, D. Walcott, R. Feiertag, and M. Schaefer, "Computer system intrusion detection, " Tech. Rep. RADC-TR-90-413, Final Technical Report, Trusted Information Systems, Inc., Dec. 1990.
-
(1990)
Computer System Intrusion Detection
-
-
Hubbards, B.1
Haley, T.2
McAuliffe, N.3
Schaefer, L.4
Kelem, N.5
Walcott, D.6
Feiertag, R.7
Schaefer, M.8
-
8
-
-
0024665277
-
Detection of anomalous computer session activity
-
1-3 May
-
H. S. Vaccaro and G. E. Liepins, "Detection of anomalous computer session activity, " in Proceedings of 1989 IEEE Computer Society Symposium on Security and Privacy, (Oakland, California), pp. 280-289, 1-3 May 1989.
-
(1989)
Proceedings of 1989 IEEE Computer Society Symposium on Security and Privacy, (Oakland, California)
, pp. 280-289
-
-
Vaccaro, H.S.1
Liepins, G.E.2
-
9
-
-
2942645420
-
Expert systems in intrusion detection: A case study
-
October
-
M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. A. Whitehurst, "Expert systems in intrusion detection: A case study, " in Proceedings of the 11th National Computer Security Conference, pp. 74-81, October 1988.
-
(1988)
Proceedings of the 11th National Computer Security Conference
, pp. 74-81
-
-
Sebring, M.M.1
Shellhouse, E.2
Hanna, M.E.3
Whitehurst, R.A.4
-
12
-
-
0003602869
-
-
San Mateo CA USA Morgan Kaufmann Publishers Inc
-
J. Kolodner, Case-Based Reasoning. San Mateo, CA, USA: Morgan Kaufmann Publishers, Inc., 1993.
-
(1993)
Case-Based Reasoning
-
-
Kolodner, J.1
-
16
-
-
0242409064
-
-
Department of Computer Science, University of California, Davis
-
J. Doak, "Intrusion detection: The application of feature selection, a comparison of algorithms, and the application of a wide area network analyzer, " masters thesis, Department of Computer Science, University of California, Davis, 1992.
-
(1992)
Intrusion Detection: The Application of Feature Selection, A Comparison of Algorithms, and the Application of A Wide Area Network Analyzer Masters Thesis
-
-
Doak, J.1
|