Conferences in DBLP
Jim Yuill , Shyhtsun Felix Wu , Fengmin Gong , Ming-Yuh Huang Intrusion Detection for an On-Going Attack. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Richard J. Feiertag , Stuart Staniford-Chen , Karl N. Levitt , Mark Heckman , Dave Peticolas , Rick Crawford , Lee Benzinger , Sue Rho , Stephen Wu Intrusion Detection Inter-component Adaptive Negotiation. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Aaron Schwartzbard , Anup K. Ghosh A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Alexandr Seleznyov , Seppo Puuronen Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Dug Song , G. Shaffer , M. Undy Nidsbench - a Network Intrusion Detection Test Suite. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Eugene H. Spafford , Diego Zamboni New directions for the AAFID architecture. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Stuart Staniford-Chen IDS Standards: Lessons Learned to Date. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] David Gorman , Mary Ruhl Intrusion Detection for Telephony Signalling. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Christopher Ting , Tiang Hwee Ong , Yong Tai Tan , Pek Yong Ng Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Singapore. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] John Kelsey , Bruce Schneier Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Christopher Wee Audit logs: to keep or not to keep? [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Richard Lippmann , Robert K. Cunningham Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Richard Lippmann , Robert K. Cunningham , David J. Fried , Isaac Graf , Kris R. Kendall , Seth E. Webster , Marc A. Zissman Results of the DARPA 1998 Offline Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Andreas Wespi , Hervé Debar Building an Intrusion-Detection System to Detect Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Emilie Lundin , Erland Jonsson Privacy vs. Intrusion Detection Analysis. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Glenn Mansfield Towards trapping wily intruders in the large. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Tim Farley Lessons Learned in Commercial IDS Development. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Wenke Lee , Salvatore J. Stolfo Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Peter Mell , Mark McLarnon Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Stefan Axelsson On a Difficulty of Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] David W. Baker , Steven M. Christey , William H. Hill , David E. Mann The Development of a Common Vulnerability Enumeration. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Matt Bishop Vulnerability Analysis: An Extended Abstract. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Pars Mutaf Defending against a Denial-of-Service Attack on TCP. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Tiang Hwee Ong , Chung Pheng Tan , Yong Tai Tan , Christopher Ting SNMS - Shadow Network Management System. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Terrence Champion , Robert Durst Air Force Intrusion Detection System Evaluation Environment. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Vern Paxson Defending against network IDS evasion. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Christina Yip Chung , Michael Gertz , Karl N. Levitt Misuse Detection in Database Systems Through User Profiling. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Qianli Zhang , Xing Li Session State Transition Based Large Network IDS. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Yves Cosendai , Marc Dacier , Paolo Scotton Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Jose Duarte de Queiroz , Luiz F. Rust da Costa Carmo , Luci Pirmez Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Jeff Rowe Intrusion Detection and Isolation Protocol: Automated Response to Attacks. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Stefanos Manganaris , Marvin Christensen , Dan Zerkle , Keith Hermiz A Data Mining Analysis of RTID Alarms. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ]