|
Journals in DBLP
- Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok
Toward Cost-Sensitive Modeling for Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:5-22 [Journal]
- Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni
Using Internal Sensors and Embedded Detectors for Intrusion Detection. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:23-70 [Journal]
- Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer
STATL: An Attack Language for State-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:71-104 [Journal]
- Stuart Staniford, James A. Hoagland, Joseph M. McAlerney
Practical Automated Detection of Stealthy Portscans. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:105-136 [Journal]
- Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia
Enhancing Profiles for Anomaly Detection Using Time Granularities. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:137-158 [Journal]
- Diomidis Spinellis, Dimitris Gritzalis
Panoptis: Intrusion Detection Using a Domain-Specific Language. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:159-176 [Journal]
- Alec Yasinsac
An Environment for Security Protocol Intrusion Detection. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:177-188 [Journal]
- C. R. Ramakrishnan, R. C. Sekar
Model-Based Analysis of Configuration Vulnerabilities. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:189-209 [Journal]
|