Defending a Computer System Using Autonomous Agents (1995)

by Mark Crosbie , Gene Spafford
Citations:70 - 3 self

Documents Related by Co-Citation

145 An Architecture for Intrusion Detection using Autonomous Agents – Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, Eugene Spafford, Diego Zamboni - 1998
225 Network intrusion detection – B Mukherjee, L T Heberlein, K N Levitt - 1994
352 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
178 Computer Immunology – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji - 1996
67 NADIR: An automated system for detecting network intrusion and misuse – J Hochberg, K Jackson, C Stallings, J F McClary, D DuBois, J Ford - 1993
531 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
459 An intrusion-detection model – Dorothy E. Denning - 1987
147 A Network Security Monitor – L Heberlein, G Dias, K Levitt, B Mukherjee, J Wood, D Wolber - 1990
68 Artificial Intelligence and Intrusion Detection: Current and Future Directions – Jeremy Frank, Nsa Urp Mda--c - 1994
97 GrIDS - A Graph Based Intrusion Detection System For Large Networks – S. Staniford-chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagl, K. Levitt, C. Wee, R. Yip, D. Zerkle - 1996
84 The architecture of a network level intrusion detection system – R Heady, G Luger, A Maccabe, M Servilla - 1990
99 Cooperating security managers: a peer-based intrusion detection system – G B White, E A Fisch, U W Pooch - 1996
150 A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION – Sandeep Kumar, Eugene H. Spafford
268 An Introduction to Software Agents – Jeffrey M. Bradshaw - 1997
324 Data Mining Approaches for Intrusion Detection – Wenke Lee, Salvatore J. Stolfo
275 Self-nonself discrimination in a computer – Stephanie Forrest, Alan S. Perelson, Lawrence Allen, Rajesh Cherukuri - 1994
279 Insertion, evasion, and denial of service: Eluding network intrusion detection – Thomas H. Ptacek, Timothy N. Newsham - 1998
86 An Immunological Model of Distributed Detection and Its Application to Computer Security – Steven Andrew Hofmeyr - 1999
294 Intrusion Detection using Sequences of System Calls – Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji - 1998