-
1
-
-
0000501656
-
Information theory as an extension of the maximum likelihood principle
-
B. N. Petrov and F. Csaksi, editors, pages Budapest, Hungary
-
H. Akaike. Information theory as an extension of the maximum likelihood principle. In B. N. Petrov and F. Csaksi, editors, Proceedings of the 2nd International Symposium on Information Theory, pages 267 – 281, Budapest, Hungary, 1973.
-
(1973)
Proceedings of the 2nd International Symposium on Information Theory
, pp. 267-281
-
-
Akaike, H.1
-
2
-
-
85180632702
-
-
D. R. (Anthraxx) and B. P. (Kolrabi). Last visited: 2 July 2002
-
D. R. (Anthraxx) and B. P. (Kolrabi). DScan software. http://www.u-n-f.com/dscan.html, 2002. Last visited: 2 July 2002.
-
(2002)
DScan software
-
-
-
3
-
-
17644409790
-
Detecting malicious groups of agents
-
Drexel University, Philadelphia, PA, USA, August
-
S. Braynov and M. Jadliwala. Detecting malicious groups of agents. In Proceedings of the First IEEE Symposium on Multi-Agent Security and Survivability, Drexel University, Philadelphia, PA, USA, August 2004.
-
(2004)
Proceedings of the First IEEE Symposium on Multi-Agent Security and Survivability
-
-
Braynov, S.1
Jadliwala, M.2
-
4
-
-
20444438039
-
Passive visual fingerprinting of network attack tools
-
Washington, DC, USA, October
-
G. Conti and K. Abdullah. Passive visual fingerprinting of network attack tools. In Proceedings of 2004 CCS Workshop on Visualization and Data Mining for Computer Security, pages 45 – 54, Washington, DC, USA, October 2004.
-
(2004)
Proceedings of 2004 CCS Workshop on Visualization and Data Mining for Computer Security
, pp. 45-54
-
-
Conti, G.1
Abdullah, K.2
-
5
-
-
33749522191
-
Attacking information visualization system usability overloading and deceiving the human
-
Pittsburgh, PA, USA, July
-
G. Conti, M. Ahamad, and J. Stasko. Attacking information visualization system usability overloading and deceiving the human. In Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, July 2005.
-
(2005)
Symposium on Usable Privacy and Security
-
-
Conti, G.1
Ahamad, M.2
Stasko, J.3
-
6
-
-
8644229619
-
The art of port scanning
-
Fyodor. The art of port scanning. Phrack Magazine, 7(51), 1997.
-
(1997)
Phrack Magazine
, vol.7
, Issue.51
-
-
Fyodor1
-
9
-
-
34547284915
-
Scan detection on very large networks using logistic regression modeling
-
Pula-Cagliari, Sardinia, Italy, June
-
C. Gates, J. J. McNutt, J. B. Kadane, and M. Kellner. Scan detection on very large networks using logistic regression modeling. In Proceedings of the IEEE Symposium on Computers and Communications, Pula-Cagliari, Sardinia, Italy, June 2006.
-
(2006)
Proceedings of the IEEE Symposium on Computers and Communications
-
-
Gates, C.1
McNutt, J. J.2
Kadane, J. B.3
Kellner, M.4
-
10
-
-
67649650450
-
Analysis techniques for detecting coordinated attacks and probes
-
Santa Clara, California, USA, April Usenix Association
-
J. Green, D. Marchette, S. Northcutt, and B. Ralph. Analysis techniques for detecting coordinated attacks and probes. In Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, April 1999. Usenix Association.
-
(1999)
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
-
-
Green, J.1
Marchette, D.2
Northcutt, S.3
Ralph, B.4
-
11
-
-
0031199150
-
Computational experience with approximation algorithms for the set covering problem
-
T. Grossman and A. Wool. Computational experience with approximation algorithms for the set covering problem. European Journal of Operational Research, 101(1):81 – 92, 1997.
-
(1997)
European Journal of Operational Research
, vol.101
, Issue.1
, pp. 81-92
-
-
Grossman, T.1
Wool, A.2
-
12
-
-
84872777701
-
Distributed information gathering
-
hybrid
-
hybrid. Distributed information gathering. Phrack Magazine, 9(55), 1999.
-
(1999)
Phrack Magazine
, vol.9
, Issue.55
-
-
-
13
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, California, USA, May IEEE Computer Society
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, pages 211 – 225, Oakland, California, USA, May 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 2004 IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A. W.3
Balakrishnan, H.4
-
14
-
-
42149105454
-
Distributed evasive scan techniques and countermeasures
-
Lucerne, Switzerland, July
-
M. G. Kang, J. Caballero, and D. Song. Distributed evasive scan techniques and countermeasures. In Proceedings of Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, Lucerne, Switzerland, July 2007.
-
(2007)
Proceedings of Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment
-
-
Kang, M. G.1
Caballero, J.2
Song, D.3
-
16
-
-
85180636555
-
-
Last visited: 12 December 2008
-
R. E. Lee. Unicornscan. http://www.unicornscan.org/, 2007. Last visited: 12 December 2008.
-
(2007)
Unicornscan
-
-
Lee, R. E.1
-
17
-
-
85180633305
-
-
Last Visited: 9 November 2004
-
Mixter. Network security analysis tools. http://nsat.sourceforge.net/, 2003. Last Visited: 9 November 2004.
-
(2003)
Network security analysis tools
-
-
-
18
-
-
84866808576
-
-
C. X. Naval Surface Warfare Center, Dahlgren Division. Last visited: 23 March 2002
-
C. X. Naval Surface Warfare Center, Dahlgren Division. Shadow indications technical analysis: Coordinated attacks and probes. http://www.nswc.navy.mil/ISSEC/CID/co-ordinated_analysis.txt, 1998. Last visited: 23 March 2002.
-
(1998)
Shadow indications technical analysis: Coordinated attacks and probes
-
-
-
20
-
-
84942250809
-
Surveillance detection in high bandwidth environments
-
Washington, DC, April
-
S. Robertson, E. V. Siegel, M. Miller, and S. J. Stolfo. Surveillance detection in high bandwidth environments. In Proceedings of the 2003 DARPA DISCEX III Conference, pages 130 – 139, Washington, DC, April 2003.
-
(2003)
Proceedings of the 2003 DARPA DISCEX III Conference
, pp. 130-139
-
-
Robertson, S.1
Siegel, E. V.2
Miller, M.3
Stolfo, S. J.4
-
21
-
-
85180624054
-
-
Powerpoint presentation on The Intrusion Correlation Engine from an ACM conference. Last visited: 13 January 2003
-
S. Staniford. Intrusion correlation engine. http://www.silicondefense.com/research/ACM-tutorial-11-4-01.ppt, 2001. Powerpoint presentation on The Intrusion Correlation Engine from an ACM conference. Last visited: 13 January 2003.
-
(2001)
Intrusion correlation engine
-
-
Staniford, S.1
-
22
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1):105 – 136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
-
23
-
-
85084162258
-
How to 0wn the Internet in your spare time
-
San Francisco, California, USA, August USENIX Association
-
S. Staniford, V. Paxson, and N. Weaver. How to 0wn the Internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, pages 149 – 167, San Francisco, California, USA, August 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
24
-
-
0000949239
-
GrIDS – a graph based intrusion detection system for large networks
-
Baltimore, MD, USA, October
-
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle. GrIDS – a graph based intrusion detection system for large networks. In Proceedings of the 19th National Information Systems Security Conference, pages 361 – 370, Baltimore, MD, USA, October 1996.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
26
-
-
33746440268
-
-
University of Southern California Information Sciences Institute. Last Visited: 9 November 2004
-
University of Southern California Information Sciences Institute. The DETER testbed: Overview. http://www.isi.edu/deter/docs/testbed.overview.pdf, 2004. Last Visited: 9 November 2004.
-
(2004)
The DETER testbed: Overview
-
-
-
27
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
Boston, MA, USA, December USENIX Association
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, pages 255 – 270, Boston, MA, USA, December 2002. USENIX Association.
-
(2002)
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
28
-
-
48649105415
-
Tracking darkports for network defense
-
Miami Beach, Florida, December
-
D. Whyte, P. van Oorschot, and E. Kramakis. Tracking darkports for network defense. In Proceedings of the 23rd Annual Computer Security Applications Conference, Miami Beach, Florida, December 2007.
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference
-
-
Whyte, D.1
van Oorschot, P.2
Kramakis, E.3
-
29
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
San Diego, California, USA, June
-
V. Yegneswaran, P. Barford, and J. Ullrich. Internet intrusions: Global characteristics and prevalence. In Proceedings of the 2003 ACM Joint International Conference on Measurement and Modeling of Computer Systems, pages 138 – 147, San Diego, California, USA, June 2003.
-
(2003)
Proceedings of the 2003 ACM Joint International Conference on Measurement and Modeling of Computer Systems
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
|