Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
暂无分享,去创建一个
[1] Harvey Einbinder. The myth of the Britannica , 1964 .
[2] James P. Egan,et al. Signal detection theory and ROC analysis , 1975 .
[3] Q. Whiting-O'Keefe,et al. Choosing the Correct Unit of Analysis in Medical Care Experiments , 1984, Medical care.
[4] J A Swets,et al. Measuring the accuracy of diagnostic systems. , 1988, Science.
[5] Dennis H. Klatt,et al. Review of the ARPA speech understanding project , 1990 .
[6] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Steven M. Bellovin,et al. Packets found on an internet , 1993, CCRV.
[8] Herbert Gish,et al. Spotting events in continuous speech , 1994, Proceedings of ICASSP '94. IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] Steve J. Young,et al. A fast lattice-based approach to vocabulary independent wordspotting , 1994, Proceedings of ICASSP '94. IEEE International Conference on Acoustics, Speech and Signal Processing.
[10] Richard Lippmann,et al. Wordspotter training using figure-of-merit back propagation , 1994, Proceedings of ICASSP '94. IEEE International Conference on Acoustics, Speech and Signal Processing.
[11] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[12] Biswanath Mukherjee,et al. A Software Platform for Testing Intrusion Detection Systems , 1997, IEEE Softw..
[13] Harald Höge,et al. Keyword verification considering the correlation of succeeding feature vectors , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[14] Salim Roukos,et al. A fast vocabulary independent algorithm for spotting words in speech , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[15] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[16] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[17] Daniel James Weber,et al. A taxonomy of computer intrusions , 1998 .
[18] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.
[19] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[20] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[21] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[22] Dominique Alessandri,et al. Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems , 2000, Recent Advances in Intrusion Detection.
[23] Jonathan Korba. Windows NT Attacks for the Evaluation of Intrusion Detection Systems , 2000 .
[24] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[25] Kymie M. C. Tan,et al. Benchmarking anomaly-based detection systems , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[26] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[27] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[28] Peter Mell,et al. Intrusion Detection Systems , 2001 .