C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Recent Advances in Intrusion Detection
1999
2000
2001
1999
2001
Keyphrases
Publications
2001
Hervé Debar
,
Andreas Wespi
Aggregation and Correlation of Intrusion-Detection Alerts.
Recent Advances in Intrusion Detection
(2001)
Robert K. Cunningham
,
Craig S. Stevenson
Accurately Detecting Source Code of Attacks That Increase Privilege.
Recent Advances in Intrusion Detection
(2001)
Prem Uppuluri
,
R. Sekar
Experiences with Specification-Based Intrusion Detection.
Recent Advances in Intrusion Detection
(2001)
Calvin Ko
,
Paul Brutch
,
Jeff Rowe
,
Guy Tsafnat
,
Karl N. Levitt
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Recent Advances in Intrusion Detection
(2001)
Steven R. Johnston
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information.
Recent Advances in Intrusion Detection
(2001)
Alfonso Valdes
,
Keith Skinner
Probabilistic Alert Correlation.
Recent Advances in Intrusion Detection
(2001)
Daniel F. Sterne
,
Kelly Djahandari
,
Brett Wilson
,
Bill Babson
,
Dan Schnackenberg
,
Harley Holliday
,
Travis Reid
Autonomic Response to Distributed Denial of Service Attacks.
Recent Advances in Intrusion Detection
(2001)
Magnus Almgren
,
Ulf Lindqvist
Application-Integrated Data Collection for Security Monitoring.
Recent Advances in Intrusion Detection
(2001)
Marc G. Welz
,
Andrew Hutchison
Interfacing Trusted Applications with Intrusion Detection Systems.
Recent Advances in Intrusion Detection
(2001)
Jean-Philippe Pouzol
,
Mireille Ducassé
From Declarative Signatures to Misuse IDS.
Recent Advances in Intrusion Detection
(2001)
Paul D. Williams
,
Kevin P. Anchor
,
John L. Bebo
,
Gregg H. Gunsch
,
Gary B. Lamont
CDIS: Towards a Computer Immune System for Detecting Network Intrusions.
Recent Advances in Intrusion Detection
(2001)
Giovanni Vigna
,
Richard A. Kemmerer
,
Per Blix
Designing a Web of Highly-Configurable Intrusion Detection Sensors.
Recent Advances in Intrusion Detection
(2001)
2000
Alfonso Valdes
,
Keith Skinner
Adaptive, Model-Based Monitoring for Cyber Attack Detection.
Recent Advances in Intrusion Detection
(2000)
Christoph C. Michael
,
Anup K. Ghosh
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Recent Advances in Intrusion Detection
(2000)
Chapman Flack
,
Mikhail J. Atallah
Better Logging through Formality.
Recent Advances in Intrusion Detection
(2000)
Dominique Alessandri
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems.
Recent Advances in Intrusion Detection
(2000)
Richard Lippmann
,
Joshua W. Haines
,
David J. Fried
,
Jonathan Korba
,
Kumar Das
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation.
Recent Advances in Intrusion Detection
(2000)
Wenke Lee
,
Rahul A. Nimbalkar
,
Kam K. Yee
,
Sunil B. Patil
,
Pragneshkumar H. Desai
,
Thuan T. Tran
,
Salvatore J. Stolfo
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions.
Recent Advances in Intrusion Detection
(2000)
John McHugh
The 1998 Lincoln Laboratory IDS Evaluation.
Recent Advances in Intrusion Detection
(2000)
Josué Kuri
,
Gonzalo Navarro
,
Ludovic Mé
,
Laurent Heye
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions.
Recent Advances in Intrusion Detection
(2000)
Frédéric Cuppens
,
Rodolphe Ortalo
LAMBDA: A Language to Model a Database for Detection of Attacks.
Recent Advances in Intrusion Detection
(2000)
Andreas Wespi
,
Marc Dacier
,
Hervé Debar
Intrusion Detection Using Variable-Length Audit Trail Patterns.
Recent Advances in Intrusion Detection
(2000)
Anup K. Ghosh
,
Christoph C. Michael
,
Michael Schatz
A Real-Time Intrusion Detection System Based on Learning Program Behavior.
Recent Advances in Intrusion Detection
(2000)
Joachim Biskup
,
Ulrich Flegel
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection.
Recent Advances in Intrusion Detection
(2000)
James Riordan
,
Dominique Alessandri
Target Naming and Service Apoptosis.
Recent Advances in Intrusion Detection
(2000)
Zakia Marrakchi
,
Ludovic Mé
,
Bernard Vivinis
,
Benjamin Morin
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects.
Recent Advances in Intrusion Detection
(2000)
1999
Jim Yuill
,
Shyhtsun Felix Wu
,
Fengmin Gong
,
Ming-Yuh Huang
Intrusion Detection for an On-Going Attack.
Recent Advances in Intrusion Detection
(1999)
Alexandr Seleznyov
,
Seppo Puuronen
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events.
Recent Advances in Intrusion Detection
(1999)
Wenke Lee
,
Salvatore J. Stolfo
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.
Recent Advances in Intrusion Detection
(1999)
Peter Mell
,
Mark McLarnon
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems.
Recent Advances in Intrusion Detection
(1999)
Richard Lippmann
,
Robert K. Cunningham
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks.
Recent Advances in Intrusion Detection
(1999)
David W. Baker
,
Steven M. Christey
,
William H. Hill
,
David E. Mann
The Development of a Common Vulnerability Enumeration.
Recent Advances in Intrusion Detection
(1999)
Vern Paxson
Defending against network IDS evasion.
Recent Advances in Intrusion Detection
(1999)
David Gorman
,
Mary Ruhl
Intrusion Detection for Telephony Signalling.
Recent Advances in Intrusion Detection
(1999)
Christopher Ting
,
Tiang Hwee Ong
,
Yong Tai Tan
,
Pek Yong Ng
Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Singapore.
Recent Advances in Intrusion Detection
(1999)
Emilie Lundin
,
Erland Jonsson
Privacy vs. Intrusion Detection Analysis.
Recent Advances in Intrusion Detection
(1999)
Tiang Hwee Ong
,
Chung Pheng Tan
,
Yong Tai Tan
,
Christopher Ting
SNMS - Shadow Network Management System.
Recent Advances in Intrusion Detection
(1999)
Dug Song
,
G. Shaffer
,
M. Undy
Nidsbench - a Network Intrusion Detection Test Suite.
Recent Advances in Intrusion Detection
(1999)
John Kelsey
,
Bruce Schneier
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Recent Advances in Intrusion Detection
(1999)
Christopher Wee
Audit logs: to keep or not to keep?
Recent Advances in Intrusion Detection
(1999)
Matt Bishop
Vulnerability Analysis: An Extended Abstract.
Recent Advances in Intrusion Detection
(1999)
Jose Duarte de Queiroz
,
Luiz F. Rust da Costa Carmo
,
Luci Pirmez
Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications.
Recent Advances in Intrusion Detection
(1999)
Stefanos Manganaris
,
Marvin Christensen
,
Dan Zerkle
,
Keith Hermiz
A Data Mining Analysis of RTID Alarms.
Recent Advances in Intrusion Detection
(1999)
Glenn Mansfield
Towards trapping wily intruders in the large.
Recent Advances in Intrusion Detection
(1999)
Aaron Schwartzbard
,
Anup K. Ghosh
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT.
Recent Advances in Intrusion Detection
(1999)
Yves Cosendai
,
Marc Dacier
,
Paolo Scotton
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks.
Recent Advances in Intrusion Detection
(1999)
Christina Yip Chung
,
Michael Gertz
,
Karl N. Levitt
Misuse Detection in Database Systems Through User Profiling.
Recent Advances in Intrusion Detection
(1999)
Andreas Wespi
,
Hervé Debar
Building an Intrusion-Detection System to Detect Suspicious Process Behavior.
Recent Advances in Intrusion Detection
(1999)
Richard J. Feiertag
,
Stuart Staniford-Chen
,
Karl N. Levitt
,
Mark R. Heckman
,
Dave Peticolas
,
Rick Crawford
,
Lee A. Benzinger
,
Sue Rho
,
Stephen Wu
Intrusion Detection Inter-component Adaptive Negotiation.
Recent Advances in Intrusion Detection
(1999)
Qianli Zhang
,
Xing Li
Session State Transition Based Large Network IDS.
Recent Advances in Intrusion Detection
(1999)