메뉴 건너뛰기




Volumn 2, Issue , 2000, Pages 12-26

Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation

Author keywords

[No Author keywords available]

Indexed keywords

ALARM SYSTEMS; COMPUTER CRIME; DENIAL-OF-SERVICE ATTACK; ERRORS; MERCURY (METAL); TELECOMMUNICATION NETWORKS;

EID: 84962260018     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2000.821506     Document Type: Conference Paper
Times cited : (743)

References (23)
  • 1
    • 0031209960 scopus 로고    scopus 로고
    • The Threat from the Net
    • M. Bishop, S. Cheung, et al., "The Threat from the Net", IEEE Spectrum, 38(8), 1997.
    • (1997) IEEE Spectrum , vol.38 , Issue.8
    • Bishop, M.1    Cheung, S.2
  • 2
    • 1542595982 scopus 로고    scopus 로고
    • Evaluation
    • R.A. Cole, J. Mariani, H. Uszkoriet, A. Zaenen, and V. Zue (eds.), Cambridge University Press
    • J. Mariani, "Evaluation", In R.A. Cole, J. Mariani, H. Uszkoriet, A. Zaenen, and V. Zue (eds.), Survey of the State of the Art in Human Language Technology, Cambridge University Press, 1997.
    • (1997) Survey of the State of the Art in Human Language Technology
    • Mariani, J.1
  • 4
    • 0030677523 scopus 로고    scopus 로고
    • Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach
    • C. Ko, G. Fink, and K. Levitt, "Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach," in Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997, pp. 134-144.
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 5
    • 1542386294 scopus 로고    scopus 로고
    • ISS RealSecure Pushes Past Newer IDS Players
    • 17 May
    • G. Shipley, "ISS RealSecure Pushes Past Newer IDS Players", Network Computing, 17 May 1999, http://www.networkcomputing.com/1010/1010r1.html.
    • (1999) Network Computing
    • Shipley, G.1
  • 6
    • 84962243245 scopus 로고    scopus 로고
    • The Information Survivability Program is described in and the Information Assurance Program is described in http://www.darpa.mil/iso/ia/, Sept
    • DARPA, The Information Survivability Program is described in http://www.darpa.mil/ito/research/is and the Information Assurance Program is described in http://www.darpa.mil/iso/ia/, Sept. 1999.
    • (1999)
  • 7
    • 0015731803 scopus 로고
    • The Relative Operating Characteristic in Psychology
    • John A. Swets, "The Relative Operating Characteristic in Psychology", Science, 182, 1973, pp. 990-1000.
    • (1973) Science , vol.182 , pp. 990-1000
    • Swets, J.A.1
  • 10
    • 0030812302 scopus 로고    scopus 로고
    • Coronary Artery Bypass Risk Prediction Using Neural Networks
    • R. P. Lippmann, and David M. Shahian, "Coronary Artery Bypass Risk Prediction Using Neural Networks," Annals of Thoracic Surgery, 63, 1997, pp. 1635-1643.
    • (1997) Annals of Thoracic Surgery , vol.63 , pp. 1635-1643
    • Lippmann, R.P.1    Shahian, D.M.2
  • 16
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
    • Washington DC, Aug
    • th Usenix Security Symposium, Washington DC, Aug. 1999, http://rcs-sgi.cs.iastate.edu/sekar/abs/usenixsec99.htm/.
    • (1999) th Usenix Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 20
    • 84962292236 scopus 로고    scopus 로고
    • Computer Security Technology Center, Sept
    • Lawrence Livermore National Laboratory, "Network Intrusion Detector (NID) Overview," Computer Security Technology Center, http://ciac.llnl.gov/cstc/nid/intro.html/, Sept. 1999.
    • (1999) Network Intrusion Detector (NID) Overview


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.