Network intrusion detection

[1]  Tom Burr,et al.  Software Toolkit for Analysis Research (STAR) , 1993 .

[2]  J. F. McClary,et al.  NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..

[3]  Biswanath Mukherjee,et al.  Detecting intrusions through attack signature analysis , 1991 .

[4]  Harold S. Javitz,et al.  The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Biswanath Mukherjee,et al.  A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  S. E. Smaha Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[7]  Steven M. Bellovin,et al.  There Be Dragons , 1992, USENIX Summer.

[8]  Peter G. Neumann,et al.  IDES: A Progress Report , 1990 .