


default search action
6. RAID 2003: Pittsburgh, PA, USA
- Giovanni Vigna, Erland Jonsson, Christopher Krügel:

Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2820, Springer 2003, ISBN 3-540-40878-9
Network Infrastructure
- Marcus Tylutki, Karl N. Levitt:

Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. 1-16 - Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur:

Topology-Based Detection of Anomalous BGP Messages. 17-35
Anomaly Detection I
- Manikantan Ramadas, Shawn Ostermann

, Brett C. Tjaden:
Detecting Anomalous Network Traffic with Self-organizing Maps. 36-54 - Ajay Gupta, R. Sekar:

An Approach for Detecting Self-propagating Email Using Anomaly Detection. 55-72
Correlation
- Xinzhou Qin, Wenke Lee:

Statistical Causality Analysis of INFOSEC Alert Data. 73-93 - Benjamin Morin, Hervé Debar:

Correlation of Intrusion Symptoms: An Application of Chronicles. 94-112
Modeling and Specification
- Jeffrey Undercoffer, Anupam Joshi

, John Pinkston:
Modeling Computer Attacks: An Ontology for Intrusion Detection. 113-135 - Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt:

Using Specification-Based Intrusion Detection for Automated Response. 136-154
IDS Sensors
- Lambert Schaelicke, Thomas Slabach, Branden J. Moore, Curt Freeland:

Characterizing the Performance of Network Intrusion Detection Sensors. 155-172 - Christopher Krügel, Thomas Toth:

Using Decision Trees to Improve Signature-Based Intrusion Detection. 173-191 - Greg Taleck:

Ambiguity Resolution via Passive OS Fingerprinting. 192-206
Anomaly Detection II
- Sung-Bae Cho, Sang-Jun Han:

Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems. 207-219 - Matthew V. Mahoney, Philip K. Chan:

An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. 220-237

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














