


default search action
3. RAID 2000: Toulouse, France
- Hervé Debar, Ludovic Mé, Shyhtsun Felix Wu:

Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings. Lecture Notes in Computer Science 1907, Springer 2000, ISBN 3-540-41085-6
Logging
- Chapman Flack, Mikhail J. Atallah:

Better Logging through Formality. 1-16 - Josué Kuri, Gonzalo Navarro, Ludovic Mé, Laurent Heye:

A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions. 17-27 - Joachim Biskup, Ulrich Flegel:

Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. 28-48
Data Mining
- Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo:

A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. 49-65 - Christoph C. Michael, Anup K. Ghosh:

Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. 66-79
Modeling Process Behavior
- Alfonso Valdes, Keith Skinner:

Adaptive, Model-Based Monitoring for Cyber Attack Detection. 80-92 - Anup K. Ghosh, Christoph C. Michael, Michael Schatz:

A Real-Time Intrusion Detection System Based on Learning Program Behavior. 93-109 - Andreas Wespi, Marc Dacier, Hervé Debar:

Intrusion Detection Using Variable-Length Audit Trail Patterns. 110-129 - Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin:

Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. 130-144
IDS Evaluation
- John McHugh:

The 1998 Lincoln Laboratory IDS Evaluation. 145-161 - Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das:

Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. 162-182 - Dominique Alessandri:

Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems. 183-196
Modeling
- Frédéric Cuppens, Rodolphe Ortalo

:
LAMBDA: A Language to Model a Database for Detection of Attacks. 197-216 - James Riordan, Dominique Alessandri:

Target Naming and Service Apoptosis. 217-226

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














