-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James Anderson Co., Fort Washington, PA, April
-
J.P. Anderson. Computer security threat monitoring and surveillance. Technical Report Technical Report, James P. Anderson Co., Fort Washington, PA, April 1980.
-
(1980)
Technical Report Technical Report
-
-
Anderson, J.P.1
-
5
-
-
85036529638
-
Intrusion detection: Applying machine learning to solaris audit data
-
Los Alamitos, CA, December IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ
-
D. Endler. Intrusion detection: Applying machine learning to solaris audit data. In Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98), pages 268-279, Los Alamitos, CA, December 1998. IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ.
-
(1998)
Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98)
, pp. 268-279
-
-
Endler, D.1
-
6
-
-
0031258214
-
Computer immunology
-
October
-
S. Forrest, S.A. Hofmeyr, and A. Somayaji. Computer immunology. Communications of the ACM, 40(10):88-96, October 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
13
-
-
34548807057
-
A pattern matching mo del for misuse intrusion detection
-
Project, Purdue University
-
S. Kumar and E.H. Spafford. A pattern matching mo del for misuse intrusion detection. The COAST Project, Purdue University, 1996.
-
(1996)
The COAST
-
-
Kumar, S.1
Spafford, E.H.2
-
17
-
-
0027609384
-
A survey of intrusion detection techniques
-
T.F. Lunt. A survey of intrusion detection techniques. Computers and Security, 12:405-418, 1993.
-
(1993)
Computers and Security
, vol.12
, pp. 405-418
-
-
Lunt, T.F.1
-
19
-
-
0003451777
-
A real-time intrusion-detection exp ert system (ides)
-
Computer Science Lab oratory, SRI Internationnal, February
-
T.F. Lunt, A. Tamaru, F. Gilham, R. Jagannthan, C. Jalali, H.S. Javitz, A. Valdos, P.G. Neumann, and T.D. Garvey. A real-time intrusion-detection exp ert system (ides). Technical Report, Computer Science Lab oratory, SRI Internationnal, February 1992.
-
(1992)
Technical Report
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannthan, R.4
Jalali, C.5
Javitz, H.S.6
Valdos, A.7
Neumann, P.G.8
Garvey, T.D.9
-
21
-
-
84873309550
-
Penetration state transition analysis - A rule-based intrusion detection approach
-
IEEE Computer So ciety Press, November
-
P.A. Porras and R.A. Kemmerer. Penetration state transition analysis - a rule-based intrusion detection approach. In Eighth Annual Computer Security Applications Conference, pages 220-229. IEEE Computer So ciety Press, November 1992.
-
(1992)
Eighth Annual Computer Security Applications Conference
, pp. 220-229
-
-
Porras, P.A.1
Kemmerer, R.A.2
-
23
-
-
85019504940
-
Netstat: A network-based intrusion detection approach
-
Los Alamitos, CA, December IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ
-
G. Vigna and R.A. Kemmerer. Netstat: A network-based intrusion detection approach. In Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98), pages 25-34, Los Alamitos, CA, December 1998. IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ.
-
(1998)
Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98)
, pp. 25-34
-
-
Vigna, G.1
Kemmerer, R.A.2
|