The SCEAS System
Navigation Menu

Conferences in DBLP

Recent Advances in Intrusion Detection (RAID) (raid)
2001 (conf/raid/2001)

  1. Jean-Philippe Pouzol, Mireille Ducassé
    From Declarative Signatures to Misuse IDS. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:1-21 [Conf]
  2. Magnus Almgren, Ulf Lindqvist
    Application-Integrated Data Collection for Security Monitoring. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:22-36 [Conf]
  3. Marc G. Welz, Andrew Hutchison
    Interfacing Trusted Applications with Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:37-53 [Conf]
  4. Alfonso Valdes, Keith Skinner
    Probabilistic Alert Correlation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:54-68 [Conf]
  5. Giovanni Vigna, Richard A. Kemmerer, Per Blix
    Designing a Web of Highly-Configurable Intrusion Detection Sensors. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:69-84 [Conf]
  6. Hervé Debar, Andreas Wespi
    Aggregation and Correlation of Intrusion-Detection Alerts. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:85-103 [Conf]
  7. Robert K. Cunningham, Craig S. Stevenson
    Accurately Detecting Source Code of Attacks That Increase Privilege. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:104-116 [Conf]
  8. Paul D. Williams, Kevin P. Anchor, John L. Bebo, Gregg H. Gunsch, Gary B. Lamont
    CDIS: Towards a Computer Immune System for Detecting Network Intrusions. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:117-133 [Conf]
  9. Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
    Autonomic Response to Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:134-149 [Conf]
  10. Steven R. Johnston
    The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:150-171 [Conf]
  11. Prem Uppuluri, R. Sekar
    Experiences with Specification-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:172-189 [Conf]
  12. Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt
    System Health and Intrusion Monitoring Using a Hierarchy of Constraints. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:190-204 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002