


default search action
5. RAID 2002: Zurich, Switzerland
- Andreas Wespi, Giovanni Vigna, Luca Deri:

Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings. Lecture Notes in Computer Science 2516, Springer 2002, ISBN 3-540-00020-8
Stepping Stone Detection
- Kwong H. Yung:

Detecting Long Connection Chains of Interactive Terminal Sessions. 1-16 - David L. Donoho, Ana Georgina Flesia

, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford:
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. 17-35 - Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo:

Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. 36-53
Anomaly Detection
- Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion:

Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. 54-73
Correlation
- Peng Ning, Yun Cui, Douglas S. Reeves:

Analyzing Intensive Intrusion Alerts via Correlation. 74-94 - Phillip A. Porras, Martin W. Fong, Alfonso Valdes:

A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. 95-114 - Benjamin Morin, Ludovic Mé, Hervé Debar

, Mireille Ducassé:
M2D2: A Formal Data Model for IDS Alert Correlation. 115-127
Legal Aspects / Intrusion Tolerance
- Steven R. Johnston:

Development of a Legal Framework for Intrusion Detection. 138-157 - James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe:

Learning Unknown Attacks - A Start. 158-176
Assessment of Intrusion Detection Systems
- Hervé Debar

, Benjamin Morin:
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. 177-198 - Robert P. Goldman:

A Stochastic Model for Intrusions. 199-218 - Vladimir I. Gorodetski, Igor V. Kotenko

:
Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. 219-238 - Mike Hall, Kevin Wiley:

Capacity Verification for High Speed Network Intrusion Detection Systems. 239-251
Adaptive Intrusion Detection Systems
- Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang:

Performance Adaptation in Real-Time Intrusion Detection Systems. 252-273
Intrusion Detection Analysis
- Thomas Toth, Christopher Krügel:

Accurate Buffer Overflow Detection via Abstract Payload Execution. 274-291 - Jacob Zimmermann, Ludovic Mé, Christophe Bidan:

Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. 292-306 - Richard Lippmann, Seth E. Webster, Douglas Stetson:

The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. 307-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














