-
1
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
[D'haeseleer et al., 1996]
-
[D'haeseleer et al., 1996] D'haeseleer, P., Forrest, S., and Helman, P. (1996). An immunological approach to change detection: Algorithms, analysis and implications. In IEEE Symposium on Security and Privacy.
-
(1996)
IEEE Symposium on Security and Privacy
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
2
-
-
0031258214
-
Computer immunology
-
[Forrest et al., 1997]
-
[Forrest et al., 1997] Forrest, S., Hofmeyr, S., and Somayaji, A. (1997). Computer immunology. Communications of the ACM, 40(10):88-96.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
5
-
-
0030104449
-
Artificial neural networks: A tutorial
-
[Jain et al., 1996]
-
[Jain et al., 1996] Jain, A., Mao, J., and Mohiuddin, K. M. (1996). Artificial neural networks: A tutorial. IEEE Computer, 29(3):31-33.
-
(1996)
IEEE Computer
, vol.29
, Issue.3
, pp. 31-33
-
-
Jain, A.1
Mao, J.2
Mohiuddin, K.M.3
-
6
-
-
34548807057
-
A pattern matching model for misuse intrusion detection
-
[Kumar and Spafford, 1996], Purdue University
-
[Kumar and Spafford, 1996] Kumar, S. and Spafford, E. (1996). A pattern matching model for misuse intrusion detection. The COAST Project, Purdue University.
-
(1996)
The COAST Project
-
-
Kumar, S.1
Spafford, E.2
-
8
-
-
85045324611
-
-
[Lippmann, 1991] , chapter Part 1, IEEE Press, Piscataway, NJ. in Neural Networks Theoretical Foundations and Analysis
-
[Lippmann, 1991] Lippmann, R. (1991). An Introduc-tion to Computing with Neural Nets, chapter Part 1, pages 5-23. IEEE Press, Piscataway, NJ. in Neural Networks Theoretical Foundations and Analysis.
-
(1991)
An Introduction to Computing with Neural Nets
, pp. 5-23
-
-
Lippmann, R.1
-
9
-
-
1842709394
-
Ides: An intelligent system for detecting intruders
-
[Lunt, 1990] , Threat and Coun-termeasures. Rome, Italy
-
[Lunt, 1990] Lunt, T. (1990). Ides: an intelligent system for detecting intruders. In Proceedings of the Symposium: Computer Security, Threat and Coun-termeasures. Rome, Italy.
-
(1990)
Proceedings of the Symposium: Computer Security
-
-
Lunt, T.1
-
10
-
-
0027609384
-
A survey of intru-sion detection techniques
-
[Lunt, 1993]
-
[Lunt, 1993] Lunt, T. (1993). A survey of intru-sion detection techniques. Computers and Security, 12:405-418.
-
(1993)
Computers and Security
, vol.12
, pp. 405-418
-
-
Lunt, T.1
-
12
-
-
0003451777
-
A real-time intrusion-detection expert system (ides)
-
[Lunt et al., 1992]
-
[Lunt et al., 1992] Lunt, T., Tamaru, A., Gilham, F., Jagannthan, R., Jalali, C., Javitz, H., Valdos, A., Neumann, P., and Garvey, T. (1992). A real-time intrusion-detection expert system (ides). Technical Report, Computer Science Laboratory, SRI Internationnal.
-
(1992)
Technical Report, Computer Science Laboratory, SRI Internationnal
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannthan, R.4
Jalali, C.5
Javitz, H.6
Valdos, A.7
Neumann, P.8
Garvey, T.9
-
13
-
-
0003577356
-
-
[Miller et al., 1995], Technical report, University of Wisconsin, Computer Sciences Dept
-
[Miller et al., 1995] Miller, B., Koski, D., Lee, C., Ma-ganty, V., Murthy, R., Natarajan, A., and Steidl, J. (1995). Fuzz revisted: A re-examination of the reliability of unix utilities and services. Technical report, University of Wisconsin, Computer Sciences Dept.
-
(1995)
Fuzz Revisted: A Re-examination of the Reliability of Unix Utilities and Services
-
-
Miller, B.1
Koski, D.2
Lee, C.3
Maganty, V.4
Murthy, R.5
Natarajan, A.6
Steidl, J.7
-
15
-
-
84873309550
-
Penetration state transition analysis - A rule-based intrusion detection approach
-
[Porras and Kemmerer, 1992], IEEE Computer Soci-ety Press
-
[Porras and Kemmerer, 1992] Porras, P. and Kemmerer, R. (1992). Penetration state transition analysis -a rule-based intrusion detection approach. In Eighth Annual Computer Security Applications Conference, pages 220-229. IEEE Computer Soci-ety Press.
-
(1992)
Eighth Annual Computer Security Applications Conference
, pp. 220-229
-
-
Porras, P.1
Kemmerer, R.2
|