-
1
-
-
84969402030
-
-
Aim Recovery. http://www.dark-e.com/des/software/aim/index.shtml.
-
-
-
-
2
-
-
84969378254
-
-
Back Orifice. http://www.cultdeadcow.com/tools/bo.html.
-
-
-
-
3
-
-
84969378260
-
-
BackDoor.XTCP. http://www.ntsecurity.new/Panda/Index.cfm?FuseAction=Virus&VirusID=659.
-
-
-
-
4
-
-
84959028485
-
-
http://binaries.faq.net.pl/security tools
-
BrowseList. http://e4gle.org/files/nttools/, http://binaries.faq.net.pl/security tools.
-
-
-
-
5
-
-
84969378257
-
-
Happy 99. http://www.symantex.com/qvcenter/venc/data/happy99.worm.html.
-
-
-
-
6
-
-
84959028487
-
-
http://home.swipenet.se/˜w-65048/hacks.htm
-
IPCrack. http://www.geocities.com/SiliconValley/Garage/3755/toolicq.html, http://home.swipenet.se/˜w-65048/hacks.htm.
-
-
-
-
7
-
-
84969378256
-
-
L0pht Crack. http://www.atstack.com/research/lc.
-
-
-
-
8
-
-
84969389966
-
-
Setup Trojan. http://www.nwinternet.com/˜pchelp/bo/setuptrojan.txt.
-
-
-
-
18
-
-
1642375563
-
Adaptive model generation: An architecture for the deployment of data minig-based intrusion detection systems
-
Andrew Honig, Andrew Howard, Eleazar Eskin, and Salvatore Stolfo. Adaptive model generation: An architecture for the deployment of data minig-based intrusion detection systems. In Data Mining for Security Applications. Kluwer, 2002.
-
(2002)
Data Mining for Security Applications. Kluwer
-
-
Honig, A.1
Howard, R.2
Eskin, E.3
Stolfo, S.4
-
19
-
-
27144514964
-
-
Internet Engineering Task Force. Intrusion detection exchange format. In http://www.ietf.org/html.charters/idwg-charter.html, 2000.
-
(2000)
Intrusion Detection Exchange Format
-
-
-
21
-
-
0002774999
-
Learning patterns from unix processes execution traces for intrusion detection
-
W. Lee, S. J. Stolfo, and P. K. Chan. Learning patterns from unix processes execution traces for intrusion detection. pages 50–56. AAAI Press, 1997.
-
(1997)
AAAI Press
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
-
24
-
-
84969397286
-
Homepage: Macafee.Com
-
MacAfee. Homepage: macafee.com. Online publication, 2000. http://www.mcafee.com.
-
(2000)
Online Publication
-
-
-
26
-
-
0038091288
-
Estimating the support of a high-dimensional distribution
-
B. Schölkopf, J. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson. Estimating the support of a high-dimensional distribution. Technical Report 99–87, Microsoft Research, 1999. To appear in Neural Computation, 2001.
-
(2001)
Technical Report 99–87, Microsoft Research, 1999. To Appear in Neural Computation
-
-
Schölkopf, B.1
Platt, J.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
27
-
-
84969393648
-
Regmon for Windows NT/9x
-
SysInternals. Regmon for Windows NT/9x. Online publication, 2000. http://www.sysinternals.com/ntw2k/source/regmon.shtml.
-
(2000)
Online Publication
-
-
-
28
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Christina Warrender, Stephanie Forrest, and Barak Pearlmutter. Detecting intrusions using system calls: alternative data models. pages 133–145. IEEE Computer Society, 1999.
-
(1999)
IEEE Computer Society
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
29
-
-
0043037096
-
Open problems in computer virus research
-
Steve R. White. Open problems in computer virus research. In Virus Bulletin Conference, 1998.
-
(1998)
Virus Bulletin Conference
-
-
White, S.R.1
|