The SCEAS System
Navigation Menu

Conferences in DBLP

Recent Advances in Intrusion Detection (RAID) (raid)
2000 (conf/raid/2000)

  1. Chapman Flack, Mikhail J. Atallah
    Better Logging through Formality. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:1-16 [Conf]
  2. Josué Kuri, Gonzalo Navarro, Ludovic Mé, Laurent Heye
    A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:17-27 [Conf]
  3. Joachim Biskup, Ulrich Flegel
    Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:28-48 [Conf]
  4. Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo
    A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:49-65 [Conf]
  5. Christoph C. Michael, Anup K. Ghosh
    Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:66-79 [Conf]
  6. Alfonso Valdes, Keith Skinner
    Adaptive, Model-Based Monitoring for Cyber Attack Detection. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:80-92 [Conf]
  7. Anup K. Ghosh, Christoph C. Michael, Michael Schatz
    A Real-Time Intrusion Detection System Based on Learning Program Behavior. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:93-109 [Conf]
  8. Andreas Wespi, Marc Dacier, Hervé Debar
    Intrusion Detection Using Variable-Length Audit Trail Patterns. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:110-129 [Conf]
  9. Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin
    Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:130-144 [Conf]
  10. John McHugh
    The 1998 Lincoln Laboratory IDS Evaluation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:145-161 [Conf]
  11. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das
    Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:162-182 [Conf]
  12. Dominique Alessandri
    Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:183-196 [Conf]
  13. Frédéric Cuppens, Rodolphe Ortalo
    LAMBDA: A Language to Model a Database for Detection of Attacks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:197-216 [Conf]
  14. James Riordan, Dominique Alessandri
    Target Naming and Service Apoptosis. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:217-226 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002