Active Bibliography

554 Practical network support for IP traceback – Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson - 2000
29 A Critical Analysis of Vulnerability Taxonomies – Matt Bishop, David Bailey - 1996
138 Checking for Race Conditions in File Accesses – Matt Bishop, Michael Dilger - 1996
348 ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay – George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, Peter M. Chen - 2002
329 Data Mining Approaches for Intrusion Detection – Wenke Lee, Salvatore J. Stolfo
304 Intrusion Detection using Sequences of System Calls – Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji - 1998
290 Security Problems in the TCP/IP Protocol Suite – S. M. Bellovin - 1989
270 Improving Host Security with System Call Policies – Niels Provos - 2002
264 A data mining framework for building intrusion detection models – Wenke Lee, Salvatore J. Stolfo, Kui W. Mok - 1999