-
1
-
-
0003835367
-
-
New Riders Publishing
-
D. Atkins, P. Buis, C. Hare, R. Kelley, C. Nachenberg, A. B. Nelson, P. Phillips, T. Ritchey, and W Steen. Internet Security Professional Reference. New Riders Publishing, 1996.
-
(1996)
Internet Security Professional Reference
-
-
Atkins, D.1
Buis, P.2
Hare, C.3
Kelley, R.4
Nachenberg, C.5
Nelson, A.B.6
Phillips, P.7
Ritchey, T.8
Steen, W.9
-
2
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
April
-
S. M. Bellovin. Security problems in the tcp/ip protocol suite. Computer Communication Review, 19(2):32-48, April 1989.
-
(1989)
Computer Communication Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
5
-
-
0029716418
-
A sense of self for unix processes
-
Los Alamitos, CA IEEE Computer Society Press
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128, Los Alamitos, CA, 1996. IEEE Computer Society Press.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
0030285403
-
The KDD process of extracting useful knowledge from volumes of data
-
November
-
U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth. The KDD process of extracting useful knowledge from volumes of data. Communications of the ACM, 39(11):27-34, November 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.11
, pp. 27-34
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
8
-
-
0003478316
-
The architecture of a network level intrusion detection system
-
University of New Mexico, August
-
R. Heady, G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system. Technical report, Computer Science Department, University of New Mexico, August 1990.
-
(1990)
Technical Report, Computer Science Department
-
-
Heady, R.1
Luger, G.2
MacCabe, A.3
Servilla, M.4
-
9
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
10
-
-
30644472748
-
-
available via anonymous ftp to ftp.ee.lbl.gov, June
-
V. Jacobson, C. Leres, and S. McCanne. tcpdump. available via anonymous ftp to ftp.ee.lbl.gov, June 1989.
-
(1989)
Tcpdump
-
-
Jacobson, V.1
Leres, C.2
McCanne, S.3
-
13
-
-
32644443064
-
Blueprint for a computer immune system
-
York-town Heights, New York
-
J. O. Kephart, G. B. Sorkin, M. Swimmer, and S. R. White. Blueprint for a computer immune system. Technical report, IBM T. J. Watson Research Center, York-town Heights, New York, 1997.
-
(1997)
Technical Report, IBM T. J. Watson Research Center
-
-
Kephart, J.O.1
Sorkin, G.B.2
Swimmer, M.3
White, S.R.4
-
16
-
-
0003451777
-
-
Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February
-
T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes, and T. Garvey. A real-time intrusion detection expert system (IDES) - final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February 1992.
-
(1992)
A Real-time Intrusion Detection Expert System (IDES) - Final Technical Report
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.5
Javitz, H.6
Valdes, A.7
Garvey, T.8
-
17
-
-
85075390249
-
Discovering frequent episodes in sequences
-
Montreal, Canada, August
-
H. Mannila, H. Toivonen, and A. I. Verkamo. Discovering frequent episodes in sequences. In Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining, Montreal, Canada, August 1995.
-
(1995)
Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining
-
-
Mannila, H.1
Toivonen, H.2
Verkamo, A.I.3
-
18
-
-
0002989559
-
End-to-end internet packet dynamics
-
September
-
Vern Paxon. End-to-end internet packet dynamics. In Proceedings of SIGCOMM '97, September 1997.
-
(1997)
Proceedings of SIGCOMM '97
-
-
Paxon, V.1
-
19
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
San Antonio, TX
-
Vern Paxon. Bro: A system for detecting network intruders in real-time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Paxon, V.1
-
22
-
-
85172423269
-
Jam: Java agents for meta-learning over distributed databases
-
Newport Beach, CA, August AAAI Press
-
S. J. Stolfo, A. L. Prodromidis, S. Tselepis, W Lee, D. W Fan, and P. K. Chan. Jam: Java agents for meta-learning over distributed databases. In Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, pages 74-81, Newport Beach, CA, August 1997. AAAI Press.
-
(1997)
Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining
, pp. 74-81
-
-
Stolfo, S.J.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.K.6
-
24
-
-
0003428414
-
-
Addison-Wesley Publishing Company
-
W. R. Stevens. TCP/IP Illustrated, Volume 1. Addison-Wesley Publishing Company, 1984.
-
(1984)
TCP/IP Illustrated
, vol.1
-
-
Stevens, W.R.1
|