Extending the DARPA off-line intrusion detection evaluations
暂无分享,去创建一个
Lee M. Rossey | Robert K. Cunningham | Richard P. Lippmann | J. W. Haines | R. Lippmann | R. Cunningham | J. Haines | L.M. Rossey
[1] B.J. Wood,et al. Red Teaming of advanced information assurance concepts , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[2] Jonathan Korba. Windows NT Attacks for the Evaluation of Intrusion Detection Systems , 2000 .
[3] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[4] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[5] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.
[6] Biswanath Mukherjee,et al. A Software Platform for Testing Intrusion Detection Systems , 1997, IEEE Softw..
[7] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[8] Dominique Alessandri,et al. Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems , 2000, Recent Advances in Intrusion Detection.
[9] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[10] Distinguished Member of the Technical Staff , 2022 .
[11] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[12] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.