-
2
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
Vigna, G., Kemmerer, R.A.: NetSTAT: A network-based intrusion detection system. Journal of Computer Security 7 (1999) 37–71
-
(1999)
Journal of Computer Security
, vol.7
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
6
-
-
26344452646
-
Correlating alerts using prerequisites of intrusions. Technical Report TR-2001-13, North Carolina State University
-
Ning, P., Reeves, D.S., Cui, Y.: Correlating alerts using prerequisites of intrusions. Technical Report TR-2001-13, North Carolina State University, Department of Computer Science (2001)
-
(2001)
Department of Computer Science
-
-
Ning, P.1
Reeves, D.S.2
Cui, Y.3
-
7
-
-
1642351593
-
An intrusion alert correlator based on prerequisites of intrusions. Technical Report TR-2002-01, North Carolina State University
-
Ning, P., Cui, Y.: An intrusion alert correlator based on prerequisites of intrusions. Technical Report TR-2002-01, North Carolina State University, Department of Computer Science (2002)
-
(2002)
Department of Computer Science
-
-
Ning, P.1
Cui, Y.2
-
8
-
-
84969375739
-
-
MIT Lincoln Lab: 2000 DARPA intrusion detection scenario specific datasets. http://www.ll.mit.edu/IST/ideval/data/2000/2000 data index.html (2000)
-
(2000)
-
-
-
9
-
-
0034301662
-
A data mining analysis of RTID alarms
-
Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A data mining analysis of RTID alarms. Computer Networks 34 (2000) 571–577
-
(2000)
Computer Networks
, vol.34
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
10
-
-
84959006924
-
-
Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/
-
DEFCON: Def con capture the flag (CTF) contest. http://www.defcon.org/html/defcon-8-post.html (2000) Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/.
-
(2000)
-
-
-
15
-
-
0000949239
-
GrIDS - A graph based intrusion detection system for large networks
-
Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yip, R., Zerkle, D.: GrIDS - a graph based intrusion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference. Volume 1. (1996) 361–370
-
(1996)
Proceedings of the 19Th National Information Systems Security Conference
, vol.1
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
16
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Transaction on Software Engineering 21 (1995) 181–199
-
(1995)
IEEE Transaction on Software Engineering
, vol.21
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
18
-
-
0031640906
-
Abstraction-based misuse detection: High-level specifications and adaptable strategies
-
Rockport, MA
-
Lin, J., Wang, X.S., Jajodia, S.: Abstraction-based misuse detection: High-level specifications and adaptable strategies. In: Proceedings of the 11th Computer Security Foundations Workshop, Rockport, MA (1998) 190–201
-
(1998)
Proceedings of the 11Th Computer Security Foundations Workshop
, pp. 190-201
-
-
Lin, J.1
Wang, X.S.2
Jajodia, S.3
-
19
-
-
84883386223
-
Abstraction-based intrusion detection in distributed environments
-
Ning, P., Jajodia, S., Wang, X.S.: Abstraction-based intrusion detection in distributed environments. ACM Transactions on Information and System Security 4 (2001) 407–452
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
|