-
1
-
-
0031209960
-
The Threat from the Net
-
M. Bishop, S. Cheung, et al., "The Threat from the Net", IEEE Spectrum, 38(8), 1997.
-
(1997)
IEEE Spectrum
, vol.38
, Issue.8
-
-
Bishop, M.1
Cheung, S.2
-
2
-
-
1542595982
-
Evaluation
-
R.A. Cole, J. Mariani, H. Uszkoriet, A. Zaenen, and V. Zue (eds.), Cambridge University Press
-
J. Mariani, "Evaluation", In R.A. Cole, J. Mariani, H. Uszkoriet, A. Zaenen, and V. Zue (eds.), Survey of the State of the Art in Human Language Technology, Cambridge University Press, 1997.
-
(1997)
Survey of the State of the Art in Human Language Technology
-
-
Mariani, J.1
-
3
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
N. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. A. Olsson, "A methodology for testing intrusion detection systems," IEEE Transactions on Software Engineering, 22, 1996, pp. 719-729.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, pp. 719-729
-
-
Puketza, N.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
4
-
-
0030677523
-
Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach
-
C. Ko, G. Fink, and K. Levitt, "Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach," in Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997, pp. 134-144.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
5
-
-
1542386294
-
ISS RealSecure Pushes Past Newer IDS Players
-
17 May
-
G. Shipley, "ISS RealSecure Pushes Past Newer IDS Players", Network Computing, 17 May 1999, http://www.networkcomputing.com/1010/1010r1.html.
-
(1999)
Network Computing
-
-
Shipley, G.1
-
6
-
-
84962243245
-
-
The Information Survivability Program is described in and the Information Assurance Program is described in http://www.darpa.mil/iso/ia/, Sept
-
DARPA, The Information Survivability Program is described in http://www.darpa.mil/ito/research/is and the Information Assurance Program is described in http://www.darpa.mil/iso/ia/, Sept. 1999.
-
(1999)
-
-
-
7
-
-
0015731803
-
The Relative Operating Characteristic in Psychology
-
John A. Swets, "The Relative Operating Characteristic in Psychology", Science, 182, 1973, pp. 990-1000.
-
(1973)
Science
, vol.182
, pp. 990-1000
-
-
Swets, J.A.1
-
9
-
-
85046873967
-
The DET Curve in Assessment of Detection Task Performance
-
A. Martin, G. Doddington, T. Kamm, M. Ordowski, and M. Przybocki, "The DET Curve in Assessment of Detection Task Performance", in Proceedings EuroSpeech 4, 1998, pp. 1895-1898.
-
(1998)
Proceedings EuroSpeech
, vol.4
, pp. 1895-1898
-
-
Martin, A.1
Doddington, G.2
Kamm, T.3
Ordowski, M.4
Przybocki, M.5
-
10
-
-
0030812302
-
Coronary Artery Bypass Risk Prediction Using Neural Networks
-
R. P. Lippmann, and David M. Shahian, "Coronary Artery Bypass Risk Prediction Using Neural Networks," Annals of Thoracic Surgery, 63, 1997, pp. 1635-1643.
-
(1997)
Annals of Thoracic Surgery
, vol.63
, pp. 1635-1643
-
-
Lippmann, R.P.1
Shahian, D.M.2
-
11
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
R. Durst, T. Champion, B. Witten, E. Miller and L. Spagnuolo, "Testing and evaluating computer intrusion detection systems", Communications of the ACM, 42(7), 1999, pp. 53-61.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
13
-
-
0013114810
-
Mining in a Data-flow Environment: Experience in Network Intrusion Detection
-
San Diego, CA, August
-
W. Lee, S.J. Stolfo, K. Mok, "Mining in a Data-flow Environment: Experience in Network Intrusion Detection", in Proceedings 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '99), San Diego, CA, August 1999, http://www.cs.columbia.edu/~sal/JAM/PROJECT/.
-
(1999)
Proceedings 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '99)
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
14
-
-
85019504940
-
NetSTAT: A network-based intrusion detection approach
-
Scottsdale, Arizona, December
-
G. Vigna and R. Kemmerer, "NetSTAT: A network-based intrusion detection approach", in Proceedings of the 14th Annual Computer Security Applications Conference, Scottsdale, Arizona, December 1998, http://www.cs.ucsb.edu/~kemm/netstat.html/.
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
-
-
Vigna, G.1
Kemmerer, R.2
-
15
-
-
85095970245
-
Experience with EMERALD to DATE
-
Santa Clara, California, April
-
P. Neumann and P. Porras, "Experience with EMERALD to DATE", in Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999, pp. 73-80, http://www.csl.sri.com/neumann/det99.html/.
-
(1999)
Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 73-80
-
-
Neumann, P.1
Porras, P.2
-
16
-
-
85084163313
-
Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
-
Washington DC, Aug
-
th Usenix Security Symposium, Washington DC, Aug. 1999, http://rcs-sgi.cs.iastate.edu/sekar/abs/usenixsec99.htm/.
-
(1999)
th Usenix Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
20
-
-
84962292236
-
-
Computer Security Technology Center, Sept
-
Lawrence Livermore National Laboratory, "Network Intrusion Detector (NID) Overview," Computer Security Technology Center, http://ciac.llnl.gov/cstc/nid/intro.html/, Sept. 1999.
-
(1999)
Network Intrusion Detector (NID) Overview
-
-
|