-
1
-
-
84944255863
-
Using rule-based activity descriptions to evaluate intrusion-detection systems
-
H. Debar, L. Me, and S. F. Wu, Eds. Springer-Verlag, New York, NY
-
Alessandri, D. 2000. Using rule-based activity descriptions to evaluate intrusion-detection systems. In RAID2000, H. Debar, L. Me, and S. F. Wu, Eds. Springer-Verlag, New York, NY, 183-196
-
(2000)
RAID2000
, pp. 183-196
-
-
Alessandri, D.1
-
2
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
CMU/SEI. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
-
Allen, J., Christie, A., Fithen, W., Mchugh, J., Pickel, J., and Stoner, E. 2000. State of the practice of intrusion detection technologies. CMU/SEI-99-TR-028,CMU/SEI. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
-
(2000)
CMU/SEI-99-TR-028
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
Mchugh, J.4
Pickel, J.5
Stoner, E.6
-
4
-
-
0003516333
-
Intrusion-detection systems: A taxonomy and survey
-
(March)
-
Axelsson, S. 2000. Intrusion-detection systems: A taxonomy and survey. 99-115 (March)
-
(2000)
, pp. 99-115
-
-
Axelsson, S.1
-
5
-
-
0003524305
-
A preliminary attempt to apply detection and estimation theory to intrusion detection
-
00--4 (March)
-
Axelsson, S. 2000. A preliminary attempt to apply detection and estimation theory to intrusion detection. 00--4 (March)
-
(2000)
-
-
Axelsson, S.1
-
6
-
-
0009060610
-
Packets found on an internet
-
(July)
-
Bellovin, S. M. 1993. Packets found on an internet. SIGCOMM Comput. Commun. Rev. 23, 3 (July), 26-31
-
(1993)
SIGCOMM Comput. Commun. Rev.
, vol.23
, pp. 26-31
-
-
Bellovin, S.M.1
-
7
-
-
0141462933
-
Attack development for intrusion detection
-
Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
-
Das, K. 2000. Attack development for intrusion detection. Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
-
(2000)
-
-
Das, K.1
-
8
-
-
2542563730
-
An experimentation workbench for intrusion detection systems
-
IBM, New York, NY
-
Debar, H., Dacier, M., Wespi, A., and Lampart, S. 1998. An experimentation workbench for intrusion detection systems. Res. Rep. RZ 2998 (#93044) (Sept.). Research Division, IBM, New York, NY
-
(1998)
Res. Rep. RZ 2998 (#93044) (Sept.). Research Division
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
9
-
-
0031632923
-
A fast vocabulary independent algorithm for spotting words in speech
-
Speech and Signal Processing (May)
-
Dharanipragada, S. and Roukos, S. 1998. A fast vocabulary independent algorithm for spotting words in speech. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing (May). 233-236
-
(1998)
Proceedings of the International Conference on Acoustics
, pp. 233-236
-
-
Dharanipragada, S.1
Roukos, S.2
-
10
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst, R., Champion, T., Witten, B., Miller, E., and Spagnuolo, L. 1999. Testing and evaluating computer intrusion detection systems. Commun. ACM 42, 7, 53-61
-
(1999)
Commun. ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
11
-
-
0004080666
-
Signal Detection Theory and ROC Analysis
-
Academic Press, Inc., Orlando, FL
-
Egan, J. P. 1975. Signal Detection Theory and ROC Analysis. Academic Press, Inc., Orlando, FL
-
(1975)
-
-
Egan, J.P.1
-
12
-
-
33751501674
-
The Myth of the Britannica
-
Grove Press, New York, NY
-
Einbinder, H. 1964. The Myth of the Britannica. Grove Press, New York, NY
-
(1964)
-
-
Einbinder, H.1
-
13
-
-
0003774428
-
How to Lie with Statistics
-
W. W. Norton & Co., Inc., New York, NY
-
Huff, D. 1954. How to Lie with Statistics. W. W. Norton & Co., Inc., New York, NY
-
(1954)
-
-
Huff, D.1
-
14
-
-
85012973695
-
A fast lattice-based approach to vocabulary independent wordspotting
-
Speech, and Signal Processing 2
-
James, D. A. and Young, S. J. 1994. A fast lattice-based approach to vocabulary independent wordspotting. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing 2. 337-380
-
(1994)
Proceedings of the IEEE International Conference on Acoustics
, pp. 337-380
-
-
James, D.A.1
Young, S.J.2
-
15
-
-
0005293913
-
Spotting events in continuous speech
-
Speech, and Signal Processing 2
-
Jeanrenaud, P., Siu, M., Rohlicek, J. R., Meteer, M., and Gish, H. 1994. Spotting events in continuous speech. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing 2. 381-384
-
(1994)
Proceedings of the IEEE International Conference on Acoustics
, pp. 381-384
-
-
Jeanrenaud, P.1
Siu, M.2
Rohlicek, J.R.3
Meteer, M.4
Gish, H.5
-
16
-
-
0031625061
-
Keyword verification considering the correlation of succeeding feature vectors
-
Speech and Signal Processing (May)
-
Junkawitsch, J. and HÖge, H. 1998. Keyword verification considering the correlation of succeeding feature vectors. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing (May). 221-224
-
(1998)
Proceedings of the International Conference on Acoustics
, pp. 221-224
-
-
Junkawitsch, J.1
HÖge, H.2
-
17
-
-
0004204715
-
A database of computer attacks for the evaluation of intrusion detection systems
-
Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
-
Kendall, K. 1999. A database of computer attacks for the evaluation of intrusion detection systems. Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
-
(1999)
-
-
Kendall, K.1
-
18
-
-
0017565919
-
Review of the ARPA speech understanding project
-
Klatt, D. H. 1977. Review of the ARPA speech understanding project. J. Acoust. Soc. Amer. 62, 1345-1366
-
(1977)
J. Acoust. Soc. Amer.
, vol.62
, pp. 1345-1366
-
-
Klatt, D.H.1
-
19
-
-
0141686095
-
Windows NT attacks for the evaluation of intrusion detection systems
-
Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
-
Korba, J. 2000. Windows NT attacks for the evaluation of intrusion detection systems. Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
-
(2000)
-
-
Korba, J.1
-
20
-
-
84944222170
-
The 1999 DARPA off-line intrusion detection evaluation
-
H. Debar, L. Me, and S. F. WU, EDS. SPRINGER-VERLAG, NEW YORK, NY
-
Lippmann, R., Haines, J. W., Fried, D. J., Korba, J., and Das, K. 2000. The 1999 DARPA off-line intrusion detection evaluation. In RAID2000, H. Debar, L. Me, and S. F. WU, EDS. SPRINGER-VERLAG, NEW YORK, NY, 162-182
-
(2000)
RAID2000
, pp. 162-182
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
21
-
-
0346329320
-
Wordspotter training using figure-of-merit back propagation
-
Speech, and Signal Processing 2
-
Lippmann, R. P., Chang, E. I., and Jankowski, C. R. 1994. Wordspotter training using figure-of-merit back propagation. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing 2. 385-388
-
(1994)
Proceedings of the IEEE International Conference on Acoustics
, pp. 385-388
-
-
Lippmann, R.P.1
Chang, E.I.2
Jankowski, C.R.3
-
22
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
In Proceedings of the on DARPA Information Survivability Conference and Exposition (DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA
-
Lippmann, R. P., Fried, D., Graf, I., Haines, J., Kendall, K., Mcclung, D., Webber, D., Webster, S., Wyschograd, D., Cunninghan, R., and Zissman, M. 2000. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of the on DARPA Information Survivability Conference and Exposition (DISCEX '00, Hilton Head, South Carolina, Jan. 25-27). IEEE Computer Society Press, Los Alamitos, CA, 12-26
-
(2000)
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
Mcclung, D.6
Webber, D.7
Webster, S.8
Wyschograd, D.9
Cunninghan, R.10
Zissman, M.11
-
24
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V. 1999. Bro: A system for detecting network intruders in real-time. Comput. Netw. J. 23-24 (Dec.), 2435-2463
-
(1999)
Comput. Netw. J. 23-24 (Dec.)
, pp. 2435-2463
-
-
Paxson, V.1
-
25
-
-
3643079262
-
A software platform for testing intrusion detection systems
-
(Sept.)
-
Puketza, N., Chung, M., Olsson, R. A., and Mukherjee, B. 1997. A software platform for testing intrusion detection systems. IEEE Software 14, 5 (Sept.), 43-51
-
(1997)
IEEE Software
, vol.14
, pp. 43-51
-
-
Puketza, N.1
Chung, M.2
Olsson, R.A.3
Mukherjee, B.4
-
26
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
Puketza, N. J., Zhang, K., Chung, M., Mukherjee, B., and Olsson, R. A. 1996. A methodology for testing intrusion detection systems. IEEE Trans. Softw. Eng. 22, 10, 719-729
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
27
-
-
0023890867
-
Measuring the accuracy of diagnostic systems
-
Swets, J. A. 1988. Measuring the accuracy of diagnostic systems. Science 24, 48, 1285-1293
-
(1988)
Science
, vol.24
, Issue.48
, pp. 1285-1293
-
-
Swets, J.A.1
-
28
-
-
0003772109
-
Evaluation of Diagnostic Systems
-
Academic Press, Inc., New York, NY
-
Swets, J. A. and Pickett, R. M. 1982. Evaluation of Diagnostic Systems. Academic Press, Inc., New York, NY
-
(1982)
-
-
Swets, J.A.1
Pickett, R.M.2
-
29
-
-
4544338227
-
A taxonomy of computer intrusions
-
Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
-
Weber, D. 1998. A taxonomy of computer intrusions. Master's Thesis. Massachusetts Institute of Technology, Cambridge, MA
-
(1998)
-
-
Weber, D.1
-
30
-
-
0021737684
-
-
(Dec.)
-
Whiting-O'Keefe, Q. E., Henke, C., and Simborg, D. W. 1984. Choosing the correct unit of analysis in medical care experiments. Med. Care 22, 12 (Dec.), 1101-1114
-
, vol.22
, pp. 1101-1114
-
-
|