-
1
-
-
0004118981
-
-
Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA, March
-
H.S. Javitz and A. Valdes, The NIDES Statistical Component: Description and Justification, Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA, March 1994.
-
(1994)
The NIDES Statistical Component: Description and Justification
-
-
Javitz, H.S.1
Valdes, A.2
-
3
-
-
0034300797
-
Anomaly-based intrusion detection: Privacy concern and other problems
-
E. Lundin and E. Johnsson, “Anomaly-based intrusion detection: privacy concern and other problems”, Computer Networks, vol. 34, 623-640, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 623-640
-
-
Lundin, E.1
Johnsson, E.2
-
4
-
-
21844476566
-
Computer network intrusion detection: A comparison of neural networks methods
-
V. Dao and V. R. Vemuri, “Computer Network Intrusion Detection: A Comparison of Neural Networks Methods”, Differential Equations and Dynamical Systems, (Special Issue on Neural Networks, Part-2), vol.10, No. 1&2, 2002.
-
(2002)
Differential Equations and Dynamical Systems, (Special Issue on Neural Networks, Part-2)
, vol.10
, Issue.1-2
-
-
Dao, V.1
Vemuri, V.R.2
-
5
-
-
0029716418
-
A sense of self for unix process
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Logstaff, “A Sense of Self for Unix process”, Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 120-128, 1996.
-
(1996)
Proceedings of 1996 IEEE Symposium on Computer Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Logstaff, T.A.4
-
8
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Santa Clara, CA, April
-
A. K. Ghosh, A. Schwartzbard and A. M. Shatz, “Learning Program Behavior Profiles for Intrusion Detection”, Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999.
-
(1999)
Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Shatz, A.M.3
-
12
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
Orlando, FL, Dec
-
C. Ko, G. Fink and K. Levitt, “Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring”, Proceedings of 10th Annual Computer Security Applications Conference, Orlando, FL, Dec, 134-144, 1994.
-
(1994)
Proceedings of 10th Annual Computer Security Applications Conference
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
13
-
-
84947547225
-
Experiences with specification-based intrusion detection
-
LNCS Springer
-
P. Uppuluri and R. Sekar, “Experiences with Specification-Based Intrusion Detection”, Recent Advances in Intrusion Detection (RAID 2001), LNCS 2212, Springer, 172-189, 2001.
-
(2001)
Recent Advances in Intrusion Detection (RAID 2001)
, vol.2212
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
15
-
-
0035338003
-
A new intrusion detection method based on discriminant analysis
-
M. Asaka, T. Onabuta, T. Inoue, S. Okazawa and S. Goto, “A New Intrusion Detection Method Based on Discriminant Analysis”, IEEE TRANS. INF. & SYST., Vol. E84-D, No. 5, 570-577, 2001.
-
(2001)
IEEE TRANS. INF. & SYST.
, vol.E84-D
, Issue.5
, pp. 570-577
-
-
Asaka, M.1
Onabuta, T.2
Inoue, T.3
Okazawa, S.4
Goto, S.5
-
16
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
N. Ye, X. Li, Q. Chen S. M. Emran and M. Xu, “Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data”, IEEE Trans. SMC-A, Vol. 31, No. 4, 266-274, 2001.
-
(2001)
IEEE Trans. SMC-A
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
18
-
-
85077565454
-
-
MIT Lincoln Laboratory, http://www.ll.mit.edu/IST/ideval/.
-
-
-
-
20
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
IEEE Computer Society Press, Los Alamitos, CA
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Webber, S. Webster, D. Wyschograd, R. Cunninghan and M. Zissan, “Evaluating Intrusion Detection Systems: the 1998 DARPA off-line Intrusion Detection Evaluation”, Proceedings of the DARPA Information Survivability Conference and Exposition, IEEE Computer Society Press, Los Alamitos, CA, 12-26, 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Webber, D.7
Webster, S.8
Wyschograd, D.9
Cunninghan, R.10
Zissan, M.11
|