


default search action
4. RAID 2001: Davis, CA, USA
- Wenke Lee, Ludovic Mé, Andreas Wespi:

Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings. Lecture Notes in Computer Science 2212, Springer 2001, ISBN 3-540-42702-3
Modeling Attacks
- Jean-Philippe Pouzol, Mireille Ducassé:

From Declarative Signatures to Misuse IDS. 1-21
Logging and IDS Integration
- Magnus Almgren

, Ulf Lindqvist
:
Application-Integrated Data Collection for Security Monitoring. 22-36 - Marc G. Welz, Andrew Hutchison:

Interfacing Trusted Applications with Intrusion Detection Systems. 37-53
IDS Cooperation
- Alfonso Valdes, Keith Skinner:

Probabilistic Alert Correlation. 54-68 - Giovanni Vigna, Richard A. Kemmerer, Per Blix:

Designing a Web of Highly-Configurable Intrusion Detection Sensors. 69-84 - Hervé Debar, Andreas Wespi:

Aggregation and Correlation of Intrusion-Detection Alerts. 85-103
Anomaly Detection
- Robert K. Cunningham, Craig S. Stevenson:

Accurately Detecting Source Code of Attacks That Increase Privilege. 104-116 - Paul D. Williams, Kevin P. Anchor, John L. Bebo, Gregg H. Gunsch, Gary B. Lamont:

CDIS: Towards a Computer Immune System for Detecting Network Intrusions. 117-133
Intrusion Tolerance
- Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid:

Autonomic Response to Distributed Denial of Service Attacks. 134-149
Legal Aspects
- Steven R. Johnston:

The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. 150-171
Specification-Based IDS
- Prem Uppuluri, R. Sekar:

Experiences with Specification-Based Intrusion Detection. 172-189 - Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt:

System Health and Intrusion Monitoring Using a Hierarchy of Constraints. 190-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














