Information Technology Reference
In-Depth Information
7. Javitz, H. and Valdes, A.: The SRI IDES Statistical Anomaly Detector. Proceedings of the
IEEE Symposium on Security and Privacy, Oakland, CA (May 1991)
8. Kosoresow, A.: Intrusion Detection via System Call Traces. IEEE Software, Vol. 14, No. 5
(1997) 35-42
9. Lankewicz, L. and Benard, M.: Real Time Anomaly Detection using a Nonparametric Pat-
tern Recognition Approach. Proceedings of the Seventh Annual Computer Security Appli-
cations Conference, San Antonio, TX (December 1991)
10. Lunt, T., Tamaru, A., and Gilham, F.: IDES: A Progress Report. Proceedings of the Sixth
Annual Computer Security Applications Conference, Tucson, AZ (December 1990)
11. Me, L.: “GASSATA: A Genetic Algorithm as an Alternative Tool or Security Audit Trails
Analysis”. First International Workshop on the Recent Advances in Intrusion Detection,
Louvain-la-Neuve, Belgium, September 1998.
12. Sekar, R. and Bendre, M.: A Fast Automaton-Based Method for Detecting Anomalous Pro-
gram Behaviors. In Proceeding of the 2001 IEEE Symposium on Security and Privacy
(2001) 144-155
13. Setubal, J. C. and Meidanis, J.: Introduction to Computational Molecular Biology , PWS
Publishing Company (1997) 47-80
14. Smaha, S.: “Haystack: An Intrusion Detection System”. Proceedings of the Fourth IEEE
Aerospace Computer Security Applications Conference, Orlando, FL (December 1988)
15. Vilo, J.: Discovering Frequent Patterns from Strings. Department of Computer Science,
University of Helsinki, Technical Report C-1998-9 (May 1998)
16. Wagner, D.: Intrusion Detection via Static Analysis. In Proceedings of the 2001 IEEE Sym-
posium on Security and Privacy (2001) 156-159
17. Warrender, C., Forrest, S., and Pearlmutter, B.: Detecting Intrusions using System Calls:
Alternative Data Models. Proceedings of the 20 th IEEE Symposium on Security and Privacy
(1999)
18. http://www.cs.unm.edu/~immsec/systemcalls.htm
Search WWH ::




Custom Search