-
1
-
-
0003482133
-
-
Intrusion.Net Books, Sparta, New Jersey
-
Amoroso, E., Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, Sparta, New Jersey, 1999.
-
(1999)
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response
-
-
Amoroso, E.1
-
3
-
-
0003337684
-
A Method of Tracing Intruders by Use of Mobile Agents
-
June
-
Asaka, M., S. Okazawa, A. Taguchi, and S. Goto, "A Method of Tracing Intruders by Use of Mobile Agents", INET'99, June 1999.
-
(1999)
INET'99
-
-
Asaka, M.1
Okazawa, S.2
Taguchi, A.3
Goto, S.4
-
4
-
-
24344489220
-
An Approach to UNIX Security Logging
-
Technical Report
-
Axelsson, S., U. Lindqvist, U. Gustafson, and E. Jonsson, "An Approach to UNIX Security Logging", Technical Report, IEEE Network, 1996.
-
(1996)
IEEE Network
-
-
Axelsson, S.1
Lindqvist, U.2
Gustafson, U.3
Jonsson, E.4
-
5
-
-
0003750241
-
An Architecture for Intrusion Detection Using Autonomous Agents
-
Purdue University
-
Balasubramaniyan, J., J. Fernandez, D. Isacoff, E. Spafford, and D. Zamboni. "An Architecture for Intrusion Detection Using Autonomous Agents", COAST Technical Report 98/5, Purdue University, 1998.
-
(1998)
COAST Technical Report
-
-
Balasubramaniyan, J.1
Fernandez, J.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
6
-
-
0009848552
-
A Distributed Autonomous-Agent Network-Intrusion Detection and Response System
-
Monterey, CA, June
-
Barrus, J. and N. Rowe, "A Distributed Autonomous-Agent Network-Intrusion Detection and Response System", Proceedings of the Command and Control Research and Technology Symposium, Monterey, CA, June 1998.
-
(1998)
Proceedings of the Command and Control Research and Technology Symposium
-
-
Barrus, J.1
Rowe, N.2
-
7
-
-
4243497140
-
-
Technical Report
-
Berenji, H. and D. Vengerov, "Learning, Cooperation, and Coordination in Multi-Agent Systems", Technical Report, IIS-00-10, 2000.
-
(2000)
Learning, Cooperation, and Coordination in Multi-Agent Systems
-
-
Berenji, H.1
Vengerov, D.2
-
8
-
-
84973857317
-
ART 2: Self-organization of Stable Category Recognition Codes for Analog Input Patterns
-
December
-
Carpenter, G. and S. Grossberg, "ART 2: Self-organization of Stable Category Recognition Codes for Analog Input Patterns", Applied Optics, Vol. 26, No. 23, December 1987.
-
(1987)
Applied Optics
, vol.26
, Issue.23
-
-
Carpenter, G.1
Grossberg, S.2
-
9
-
-
0345477912
-
A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response
-
West Point, NY, June
-
Carver, C., J. Hill, J. Surdu, and U. Pooch, "A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response", IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, June 2000.
-
(2000)
IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop
-
-
Carver, C.1
Hill, J.2
Surdu, J.3
Pooch, U.4
-
12
-
-
23944487084
-
A Revised Taxonomy for Intrusion Detection Systems
-
Technical Report
-
Debar, H., M. Dacier, and A. Wepspi, "A Revised Taxonomy for Intrusion Detection Systems", Technical Report, Computer Science/Mathematics, 1999.
-
(1999)
Computer Science/Mathematics
-
-
Debar, H.1
Dacier, M.2
Wepspi, A.3
-
14
-
-
0007724451
-
Balancing Cooperation and Risk in Intrusion Detection
-
February
-
Frincke, D., "Balancing Cooperation and Risk in Intrusion Detection", ACM Transaction on Information and System Security, Vol. 3, No. 1, February 2000.
-
(2000)
ACM Transaction on Information and System Security
, vol.3
, Issue.1
-
-
Frincke, D.1
-
15
-
-
0003691704
-
-
MIT Press, Cambridge, Massachusetts
-
Grossberg, S., ed., Neural Networks and Natural Intelligence, MIT Press, Cambridge, Massachusetts, 1988.
-
(1988)
Neural Networks and Natural Intelligence
-
-
Grossberg, S.1
-
16
-
-
85015336184
-
Intelligent Agents for Intrusion Detection
-
Syracuse, NY, September
-
Helmer, G., J. Wong, V. Honavar, and L. Miller, "Intelligent Agents for Intrusion Detection", Proceedings, IEEE Information Technology Conference, pages 121-124, Syracuse, NY, September 1998.
-
(1998)
Proceedings, IEEE Information Technology Conference
, pp. 121-124
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
-
17
-
-
3042589970
-
Mobile Agents in Intrusion Detection and Response
-
Ottawa, Canada, June
-
Jansen, W., P. Mell, T. Karygiannis, and D. Marks, "Mobile Agents in Intrusion Detection and Response", Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, June 2000.
-
(2000)
Proceedings of the 12th Annual Canadian Information Technology Security Symposium
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
18
-
-
77949731575
-
Temporal Sequence Learning and Data Reduction for Anomaly Detection
-
August
-
Lane, T. and C.E. Brodley, "Temporal Sequence Learning and Data Reduction for Anomaly Detection", ACM Transaction on Information and System Security, Vol. 2, No. 3, August 1999.
-
(1999)
ACM Transaction on Information and System Security
, vol.2
, Issue.3
-
-
Lane, T.1
Brodley, C.E.2
-
21
-
-
0028385414
-
Fuzzy Logic, Neural Networks and Soft Computing
-
Zadeh, L., "Fuzzy Logic, Neural Networks and Soft Computing", Communications of the ACM, Vol. 37, No. 3, pp. 77-84, 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.3
, pp. 77-84
-
-
Zadeh, L.1
|