Conferences in DBLP
Jean-Philippe Pouzol , Mireille Ducassé From Declarative Signatures to Misuse IDS. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:1-21 [Conf ] Magnus Almgren , Ulf Lindqvist Application-Integrated Data Collection for Security Monitoring. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:22-36 [Conf ] Marc G. Welz , Andrew Hutchison Interfacing Trusted Applications with Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:37-53 [Conf ] Alfonso Valdes , Keith Skinner Probabilistic Alert Correlation. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:54-68 [Conf ] Giovanni Vigna , Richard A. Kemmerer , Per Blix Designing a Web of Highly-Configurable Intrusion Detection Sensors. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:69-84 [Conf ] Hervé Debar , Andreas Wespi Aggregation and Correlation of Intrusion-Detection Alerts. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:85-103 [Conf ] Robert K. Cunningham , Craig S. Stevenson Accurately Detecting Source Code of Attacks That Increase Privilege. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:104-116 [Conf ] Paul D. Williams , Kevin P. Anchor , John L. Bebo , Gregg H. Gunsch , Gary B. Lamont CDIS: Towards a Computer Immune System for Detecting Network Intrusions. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:117-133 [Conf ] Daniel F. Sterne , Kelly Djahandari , Brett Wilson , Bill Babson , Dan Schnackenberg , Harley Holliday , Travis Reid Autonomic Response to Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:134-149 [Conf ] Steven R. Johnston The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:150-171 [Conf ] Prem Uppuluri , R. Sekar Experiences with Specification-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:172-189 [Conf ] Calvin Ko , Paul Brutch , Jeff Rowe , Guy Tsafnat , Karl N. Levitt System Health and Intrusion Monitoring Using a Hierarchy of Constraints. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:190-204 [Conf ]