![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
2. RAID 1999: West Lafayette, Indiana, USA
- Recent Advances in Intrusion Detection, Second International Workshop, RAID 1999, West Lafayette, Indiana, USA, September 7-9, 1999. 1999
Session 1
- Christina Yip Chung, Michael Gertz, Karl N. Levitt:
Misuse Detection in Database Systems Through User Profiling. - Christopher Wee:
Audit logs: to keep or not to keep?
Session 2: Agent-based Detection Systems
- Jose Duarte de Queiroz, Luiz F. Rust da Costa Carmo, Luci Pirmez:
Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications. - Peter Mell, Mark McLarnon:
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems. - Eugene H. Spafford, Diego Zamboni:
New directions for the AAFID architecture.
Session 3: Knowledge Engineering and IDS
- Wenke Lee, Salvatore J. Stolfo:
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. - Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz:
A Data Mining Analysis of RTID Alarms. - Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark R. Heckman, Dave Peticolas, Rick Crawford, Lee A. Benzinger, Sue Rho, Stephen Wu:
Intrusion Detection Inter-component Adaptive Negotiation. - Andreas Wespi, Hervé Debar:
Building an Intrusion-Detection System to Detect Suspicious Process Behavior.
Session 4: IDS and Law
- Glenn Mansfield:
Towards trapping wily intruders in the large.
Session 5: Standards, Assessment, and Lessons Learned
- Vern Paxson:
Defending against network IDS evasion. - Stuart Staniford-Chen:
IDS Standards: Lessons Learned to Date. - Richard Lippmann, Robert K. Cunningham, David J. Fried, Isaac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman:
Results of the DARPA 1998 Offline Intrusion Detection Evaluation. - Tim Farley:
Lessons Learned in Commercial IDS Development. - Terrence G. Champion, Robert Durst:
Air Force Intrusion Detection System Evaluation Environment.
Session 6: Vulnerability Definitions
- Dug Song, G. Shaffer, M. Undy:
Nidsbench - a Network Intrusion Detection Test Suite. - Matt Bishop:
Vulnerability Analysis: An Extended Abstract. - David W. Baker, Steven M. Christey, William H. Hill, David E. Mann:
The Development of a Common Vulnerability Enumeration.
Session 7: Overarching Concerns
- Emilie Lundin, Erland Jonsson:
Privacy vs. Intrusion Detection Analysis. - Stefan Axelsson:
On a Difficulty of Intrusion Detection. - Christopher Ting, Tiang Hwee Ong, Yong Tai Tan, Pek Yong Ng:
Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Singapore. - David Gorman, Mary Ruhl:
Intrusion Detection for Telephony Signalling. - John Kelsey, Bruce Schneier:
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Session 8
- Alexandr Seleznyov, Seppo Puuronen:
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events. - Richard Lippmann, Robert K. Cunningham:
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. - Yves Cosendai, Marc Dacier, Paolo Scotton:
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. - Qianli Zhang, Xing Li:
Session State Transition Based Large Network IDS. - Pars Mutaf:
Defending against a Denial-of-Service Attack on TCP.
Session 9
- Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang:
Intrusion Detection for an On-Going Attack. - Jeff Rowe:
Intrusion Detection and Isolation Protocol: Automated Response to Attacks. - Aaron Schwartzbard, Anup K. Ghosh:
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. Recent Advances in Intrusion Detection 1999
Session 10
- Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Christopher Ting:
SNMS - Shadow Network Management System.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.