Information Technology Reference
In-Depth Information
6. P Ning. D Xu. “Hypothesizing and Reasoning about Attacks Missed by Intrusion
Detection Systems.” ACM Transactions on Information and System Security Vol.
7, No. 4, pp. 591-627. 2004.
7. P Ning, D Xu. CG Healey and R St. Amant. “Building Attack Scenarios through
Integration of Complementary Alert Methods” Proceedings of the 11th Annual
Network and Distributed System Security Symposium. 2004.
8. L Wang, A Liu and S Jajoda. “An Ecient Unified Approach to Correlating Hy-
pothesising, and Predicting Intrusion Alerts.” Proceedings of European Symposium
on Computer Security. 2005.
9. J Twycross and U Aickelin. “Towards a Conceptual Framework for Innate Im-
munity.” Proceedings of the 4th International Conference on Artificial Immune
Systems, Banff, Canada, 2005.
10. J Twycross and U Aickelin. “libtissue - implementing innate immunity.” Proceed-
ings of the Congress on Evolution Computation. 2006.
11. Washington University FTP Server. http://www.wu-ftpd.org/
12. K. Mathias and D. Whitley. “Transforming the Search Space with Gray Coding.”
IEEE Conf. on Evolutionary Computation. Volume 1. pp: 513-518, 1994.
13. J Balthrop, F Esponda, S Forrest, M Glickman. “Coverage and Generalization in
an Artificial Immune System.” Genetic and Evolutionary Computation Conference
(GECCO) 2002.
14. G Tedesco. Firestorm Network Intrusion Detection System. http://www.scara-
manga.co.uk/firestorm/ .
15. M Roesch. Snort Network Intrusion Detection System. http://www.snort.org/
16. Berkeley Labs Internet Trac Archive Data Set: LBNL-FTP-PKT. http://
www-nrg.ee.lbl.gov/LBNL-FTP-PKT.html
17. V Yegneswaran, JT Gin, P Barford, S Jha. “An Architecture for Generating
Semantics-Aware Signatures.” Proceedings of USENIX Security Conference, 2005.
Search WWH ::




Custom Search