-
1
-
-
0037986866
-
Detecting unusual program behavior using the statistical components of the Next-Generation Intrusion Detection Expert System (NIDES)
-
SRI-CSL-95-06, May
-
D. Anderson, T.G. Lunt, H. Javitz, A. Tamaru, and A. Valdes, "Detecting Unusual Program Behavior using the Statistical Components of the Next-Generation Intrusion Detection Expert System (NIDES)," Computer Science Laboratory, SRI-CSL-95-06, May 1995.
-
(1995)
Computer Science Laboratory
-
-
Anderson, D.1
Lunt, T.G.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
3
-
-
8744306659
-
Boiling frogs
-
July/August
-
G. Cybenko, "Boiling Frogs," IEEE Security & Privacy Magazine, Vol. 1, No. 4, pg. 5, July/August 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.4
, pp. 5
-
-
Cybenko, G.1
-
4
-
-
0023294428
-
An intrusion detection model
-
D. Denning, "An Intrusion Detection Model," IEEE Trans. on Software Engineering, Vol. 13, No. 2, pp. 222-232, 1987.
-
(1987)
IEEE Trans. on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
6
-
-
0013420742
-
Using UNIX: Collected traces of 168 users
-
Dept. of Computer Science, University of Calgary, Calgary, Canada
-
S. Greenberg, "Using UNIX: Collected Traces of 168 Users," Research Report 88-333-45, Dept. of Computer Science, University of Calgary, Calgary, Canada, 1988.
-
(1988)
Research Report 88-333-45
-
-
Greenberg, S.1
-
9
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S.J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," ACM Trans. on Information and System Security, Vol. 3, No. 4, 2000.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.4
-
-
Lee, W.1
Stolfo, S.J.2
-
11
-
-
0043037134
-
Modeling and simulation for network vulnerability assessment
-
Fort Lee, VA, October 9-11
-
D. Pepyne, W. Gong, and Y. Ho, "Modeling and Simulation for Network Vulnerability Assessment," presented at the 40th U.S. Army Ops. Research Symposium (AORS), Fort Lee, VA, October 9-11, 2001.
-
(2001)
40th U.S. Army Ops. Research Symposium (AORS)
-
-
Pepyne, D.1
Gong, W.2
Ho, Y.3
-
14
-
-
8744303430
-
Learning temporal regularities of user behavior for anomaly detection
-
St. Petersburg, Russia
-
A. Seleznyov, O. Mazhelis, and S. Puuronen, "Learning Temporal Regularities of User Behavior for Anomaly Detection," International Workshop MMM-ACNS, St. Petersburg, Russia, 2001.
-
(2001)
International Workshop MMM-ACNS
-
-
Seleznyov, A.1
Mazhelis, O.2
Puuronen, S.3
-
17
-
-
8744245872
-
Stop thieves from stealing you
-
October
-
"Stop Thieves from Stealing You," Consumer Reports, pp. 12-17, October 2003.
-
(2003)
Consumer Reports
, pp. 12-17
-
-
-
19
-
-
8644270792
-
Monitoring and early warning for internet worms
-
University of Massachusetts
-
C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and Early Warning for Internet Worms," University of Massachusetts, Elec. and Comp. Eng. Tech. Rpt TR-CSE-03-01, 2003.
-
(2003)
Elec. and Comp. Eng. Tech. Rpt
, vol.TR-CSE-03-01
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
20
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington D.C., November
-
C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," Proceedings of CCS'02, Washington D.C., November, 2002.
-
(2002)
Proceedings of CCS'02
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
|