The SCEAS System
Navigation Menu

Conferences in DBLP

Recent Advances in Intrusion Detection (RAID) (raid)
1999 (conf/raid/1999)

  1. Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang
    Intrusion Detection for an On-Going Attack. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  2. Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu
    Intrusion Detection Inter-component Adaptive Negotiation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  3. Aaron Schwartzbard, Anup K. Ghosh
    A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  4. Alexandr Seleznyov, Seppo Puuronen
    Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  5. Dug Song, G. Shaffer, M. Undy
    Nidsbench - a Network Intrusion Detection Test Suite. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  6. Eugene H. Spafford, Diego Zamboni
    New directions for the AAFID architecture. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  7. Stuart Staniford-Chen
    IDS Standards: Lessons Learned to Date. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  8. David Gorman, Mary Ruhl
    Intrusion Detection for Telephony Signalling. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  9. Christopher Ting, Tiang Hwee Ong, Yong Tai Tan, Pek Yong Ng
    Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Singapore. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  10. John Kelsey, Bruce Schneier
    Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  11. Christopher Wee
    Audit logs: to keep or not to keep? [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  12. Richard Lippmann, Robert K. Cunningham
    Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  13. Richard Lippmann, Robert K. Cunningham, David J. Fried, Isaac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman
    Results of the DARPA 1998 Offline Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  14. Andreas Wespi, Hervé Debar
    Building an Intrusion-Detection System to Detect Suspicious Process Behavior. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  15. Emilie Lundin, Erland Jonsson
    Privacy vs. Intrusion Detection Analysis. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  16. Glenn Mansfield
    Towards trapping wily intruders in the large. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  17. Tim Farley
    Lessons Learned in Commercial IDS Development. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  18. Wenke Lee, Salvatore J. Stolfo
    Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  19. Peter Mell, Mark McLarnon
    Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  20. Stefan Axelsson
    On a Difficulty of Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  21. David W. Baker, Steven M. Christey, William H. Hill, David E. Mann
    The Development of a Common Vulnerability Enumeration. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  22. Matt Bishop
    Vulnerability Analysis: An Extended Abstract. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  23. Pars Mutaf
    Defending against a Denial-of-Service Attack on TCP. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  24. Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Christopher Ting
    SNMS - Shadow Network Management System. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  25. Terrence Champion, Robert Durst
    Air Force Intrusion Detection System Evaluation Environment. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  26. Vern Paxson
    Defending against network IDS evasion. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  27. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    Misuse Detection in Database Systems Through User Profiling. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  28. Qianli Zhang, Xing Li
    Session State Transition Based Large Network IDS. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  29. Yves Cosendai, Marc Dacier, Paolo Scotton
    Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  30. Jose Duarte de Queiroz, Luiz F. Rust da Costa Carmo, Luci Pirmez
    Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  31. Jeff Rowe
    Intrusion Detection and Isolation Protocol: Automated Response to Attacks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  32. Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz
    A Data Mining Analysis of RTID Alarms. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002