메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Should security researchers experiment more and draw more inferences?

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 85084162204     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (20)
  • 7
    • 70450014575 scopus 로고    scopus 로고
    • Comparing anomaly-detection algorithms for keystroke dynamics
    • June 29–July 2, 2009, Estoril, Lisbon, Portugal),. IEEE Computer Society, Los Alamitos, CA
    • K. S. Killourhy and R. A. Maxion, “Comparing anomaly-detection algorithms for keystroke dynamics,” in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), (June 29–July 2, 2009, Estoril, Lisbon, Portugal), pp. 125–134, IEEE Computer Society, Los Alamitos, CA, 2009.
    • (2009) IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009) , pp. 125-134
    • Killourhy, K.S.1    Maxion, R.A.2
  • 9
    • 84944222170 scopus 로고    scopus 로고
    • Analysis and results of the 1999 DARPA offline intrusion detection evaluation
    • October 2–4, 2000, Toulouse, France),. Springer-Verlag, Berlin
    • R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, “Analysis and results of the 1999 DARPA offline intrusion detection evaluation,” in Recent Advances in Intrusion Detection (RAID 2000), (October 2–4, 2000, Toulouse, France), pp. 162–182, Springer-Verlag, Berlin, 2000.
    • (2000) Recent Advances in Intrusion Detection (RAID 2000) , pp. 162-182
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 12
    • 78249239478 scopus 로고    scopus 로고
    • Behavior-based worm detectors compared
    • September 15–17, 2010, Ottawa, Ontario, Canada),. Springer-Verlag, Berlin
    • S. Stafford and J. Li, “Behavior-based worm detectors compared,” in Recent Advances in Intrusion Detection (RAID 2010), (September 15–17, 2010, Ottawa, Ontario, Canada), pp. 38–57, Springer-Verlag, Berlin, 2010.
    • (2010) Recent Advances in Intrusion Detection (RAID 2010) , pp. 38-57
    • Stafford, S.1    Li, J.2
  • 17
    • 0032070168 scopus 로고    scopus 로고
    • Should computer scientists experiment more?
    • May
    • W. F. Tichy, “Should computer scientists experiment more?,” Computer, vol. 31, pp. 32–40, May 1998.
    • (1998) Computer , vol.31 , pp. 32-40
    • Tichy, W.F.1
  • 18
    • 35649020213 scopus 로고    scopus 로고
    • How to design computer security experiments
    • June 19–21, 2007, West Point, NY),. Springer, New York
    • S. Peisert and M. Bishop, “How to design computer security experiments,” in 5th World Conference on Information Security Education (WISE 2007), (June 19–21, 2007, West Point, NY), pp. 141–148, Springer, New York, 2007.
    • (2007) 5th World Conference on Information Security Education (WISE 2007) , pp. 141-148
    • Peisert, S.1    Bishop, M.2
  • 19
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • May 16–19, 2010, Berkeley, CA),. IEEE Computer Society, Los Alamitos, CA
    • R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in 2010 IEEE Symposium on Security and Privacy, (May 16–19, 2010, Berkeley, CA), pp. 305–316, IEEE Computer Society, Los Alamitos, CA, 2010.
    • (2010) 2010 IEEE Symposium on Security and Privacy , pp. 305-316
    • Sommer, R.1    Paxson, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.