-
1
-
-
0003750241
-
-
Coast TR 98-05. West Lafayette, COAST Laboratory, Purdue University
-
J.S.Balasubramaniyan, J.O.Garcia-Fernandez, D.Isacoff, E.Spafford, and D.Zamboni, An Architecture for Intrusion Detection Using Autonomous Agents. Coast TR 98-05. West Lafayette, COAST Laboratory, Purdue University, 1998.
-
(1998)
An Architecture for Intrusion Detection Using Autonomous Agents
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
2
-
-
0347742772
-
Intrusion Detection System and Multisensor Data Fusion: Creating Cyberspace Situational Awareness
-
T.Bass, "Intrusion Detection System and Multisensor Data Fusion: Creating Cyberspace Situational Awareness", Communication of the ACM, Vol.43, No. 4, 2000.
-
(2000)
Communication of the ACM
, vol.43
, Issue.4
-
-
Bass, T.1
-
3
-
-
84958776699
-
Network Security Modeling and Cyber Attack Simulation Methodology
-
S.-D.Chi, J.S.Park, K.-C.Jung and J.-S.Lee, "Network Security Modeling and Cyber Attack Simulation Methodology", Lecture Notes in Computer Science, Vol.2119, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2119
-
-
Chi, S.-D.1
Park, J.S.2
Jung, K.-C.3
Lee, J.-S.4
-
4
-
-
0030701247
-
Information System Attacks: A Preliminary Classification Scheme
-
F.B.Cohen, "Information System Attacks: A Preliminary Classification Scheme", Computers and Security, Vol.16, No.1, 1997.
-
(1997)
Computers and Security
, vol.16
, Issue.1
-
-
Cohen, F.B.1
-
5
-
-
3042553959
-
An Intelligent Intrusion Detection System for Intrusion Detection
-
Springer Verlag
-
D.Dasgupta and F.Gonzales, "An Intelligent Intrusion Detection System for Intrusion Detection", Lecture Notes in Computer Science, Vol.2052, Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2052
-
-
Dasgupta, D.1
Gonzales, F.2
-
6
-
-
33644535884
-
STATL: An Attack Language for State-based Intrusion Detection
-
Athens, Greece, November
-
S.T.Eckmann, G.Vigna, and R.A.Kemmerer, "STATL: An Attack Language for State-based Intrusion Detection", Proceedings of the ACM Workshop on Intrusion Detection, Athens, Greece, November 2000.
-
(2000)
Proceedings of the ACM Workshop on Intrusion Detection
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
7
-
-
0031258214
-
Computer Immunology
-
S. Forrest, S. Hofmeyr, and A. Somayaji, "Computer Immunology", Communications of the ACM, Vol. 40, No. 10, 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
8
-
-
3042592075
-
Integrated Multi-Agent Information Security System: Mechanisms of Agents' Operation and Learning
-
Manchester. UK
-
V.Gorodetski, I.Kotenko, L.Popyack, and V.Skormin, "Integrated Multi-Agent Information Security System: Mechanisms of Agents' Operation and Learning", PAAM' 2000. Manchester. UK. 2000.
-
(2000)
PAAM' 2000
-
-
Gorodetski, V.1
Kotenko, I.2
Popyack, L.3
Skormin, V.4
-
9
-
-
3042647003
-
Software Development Kit for Multi-agent Systems Design and Implementation
-
Springer Verlag
-
V.Gorodetski, O.Karsayev, I.Kotenko, A.Khabalov, "Software Development Kit for Multi-agent Systems Design and Implementation", Lecture Notes in Artificial Intelligence, Vol.2296, Springer Verlag, 2002.
-
(2002)
Lecture Notes in Artificial Intelligence
, vol.2296
-
-
Gorodetski, V.1
Karsayev, O.2
Kotenko, I.3
Khabalov, A.4
-
10
-
-
85015336184
-
Intelligent Agents for Intrusion Detection
-
Syracuse. NY: IEEE
-
G.Helmer, J.Wong, V.Honavar, and L.Miller, Intelligent Agents for Intrusion Detection, Proceedings of the 1998 IEEE Information Technology Conference, Environment for the Future. Syracuse. NY: IEEE, 1998.
-
(1998)
Proceedings of the 1998 IEEE Information Technology Conference, Environment for the Future
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
-
11
-
-
0003615205
-
A Common Language for Computer Security Incidents
-
October
-
J.D.Howard, and T.A.Longstaff, A Common Language for Computer Security Incidents, SANDIA REPORT, SAND98-8667, October 1998.
-
(1998)
SANDIA Report
-
-
Howard, J.D.1
Longstaff, T.A.2
-
13
-
-
3042589970
-
Mobile Agents in Intrusion Detection and Response
-
Ottawa, Canada, June
-
W.Jansen, P.Mell, T. Karygiannis, and D.Marks, "Mobile Agents in Intrusion Detection and Response", Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, June 2000.
-
(2000)
Proceedings of the 12th Annual Canadian Information Technology Security Symposium
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
14
-
-
0004229237
-
-
Ph.D. Dissertation, Computer Sciences Department, Purdue University, Lafayette, IN, May
-
I.V.Krsul, Software Vulnerability Analysis, Ph.D. Dissertation, Computer Sciences Department, Purdue University, Lafayette, IN, May, 1998.
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, I.V.1
-
16
-
-
2942599742
-
Algorithms for Mining System Audit Data
-
T. Y. Lin and N. Cercone (eds.), Kluwer Academic Publishers
-
W.Lee, S.Stolfo, and K.Mok, "Algorithms for Mining System Audit Data". Data Retrieval and Data Mining. T. Y. Lin and N. Cercone (eds.), Kluwer Academic Publishers, 1999.
-
(1999)
Data Retrieval and Data Mining
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
17
-
-
0002522158
-
Meta-Learning in Distributed Data Mining Systems: Issues and Approaches
-
Kargupta and Chan (eds.), AAAI Press
-
A.Prodromidis, P.Chan, and S.Stolfo, "Meta-Learning in Distributed Data Mining Systems: Issues and Approaches", Advances in Distributed Data Mining, Kargupta and Chan (eds.), AAAI Press, 1999.
-
(1999)
Advances in Distributed Data Mining
-
-
Prodromidis, A.1
Chan, P.2
Stolfo, S.3
|