Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation
暂无分享,去创建一个
R.K. Cunningham | D.J. Fried | R.P. Lippmann | J.W. Haines | M.A. Zissman | D. Wyschogrod | I. Graf | K.R. Kendall | D. McClung | D. Weber | S.E. Webster | R. Lippmann | R. Cunningham | S. Webster | D. Fried | M. Zissman | J. Haines | I. Graf | K. Kendall | D. McClung | D. Weber | D. Wyschogrod | Isaac Graf | David McClung
[1] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[2] R. Sekar,et al. Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications , 1999, USENIX Security Symposium.
[3] Steven Cheung,et al. The threat from the net [Internet security] , 1997 .
[4] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[5] Robert Tibshirani,et al. An Introduction to the Bootstrap , 1994 .
[6] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[7] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[8] BishopMatt,et al. The threat from the net , 1997 .
[9] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[10] James P. Egan,et al. Signal detection theory and ROC analysis , 1975 .
[11] J. Swets. The Relative Operating Characteristic in Psychology , 1973, Science.
[12] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[13] Varol Akman. Book Review--Ronald Cole (editor-in-chief), Joseph Mariani, Hans Uszkoreit, Annie Zaenen, and Victor Zue, eds., Survey of the State of the Art in Human Language Technology , 1999 .
[14] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.
[15] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[16] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[17] R. Lippmann,et al. Coronary artery bypass risk prediction using neural networks. , 1997, Annals of Thoracic Surgery.
[18] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[19] Greg Shipley,et al. ISS RealSecure pushes past newer IDS players , 1999 .
[20] Alvin F. Martin,et al. The DET curve in assessment of detection task performance , 1997, EUROSPEECH.