|
Conferences in DBLP
- Chapman Flack, Mikhail J. Atallah
Better Logging through Formality. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:1-16 [Conf]
- Josué Kuri, Gonzalo Navarro, Ludovic Mé, Laurent Heye
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:17-27 [Conf]
- Joachim Biskup, Ulrich Flegel
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:28-48 [Conf]
- Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:49-65 [Conf]
- Christoph C. Michael, Anup K. Ghosh
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:66-79 [Conf]
- Alfonso Valdes, Keith Skinner
Adaptive, Model-Based Monitoring for Cyber Attack Detection. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:80-92 [Conf]
- Anup K. Ghosh, Christoph C. Michael, Michael Schatz
A Real-Time Intrusion Detection System Based on Learning Program Behavior. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:93-109 [Conf]
- Andreas Wespi, Marc Dacier, Hervé Debar
Intrusion Detection Using Variable-Length Audit Trail Patterns. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:110-129 [Conf]
- Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:130-144 [Conf]
- John McHugh
The 1998 Lincoln Laboratory IDS Evaluation. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:145-161 [Conf]
- Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:162-182 [Conf]
- Dominique Alessandri
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:183-196 [Conf]
- Frédéric Cuppens, Rodolphe Ortalo
LAMBDA: A Language to Model a Database for Detection of Attacks. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:197-216 [Conf]
- James Riordan, Dominique Alessandri
Target Naming and Service Apoptosis. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:217-226 [Conf]
|