An Architecture for Intrusion Detection using Autonomous Agents (1998)

by Jai Sundar Balasubramaniyan , Jose Omar Garcia-Fernandez , David Isacoff , Eugene Spafford , Diego Zamboni
Citations:143 - 10 self

Active Bibliography

75 Intrusion detection using autonomous agents – Eugene H. Spafford, Diego Zamboni - 2000
Doing intrusion detection using embedded sensors -- Thesis proposal – Diego Zamboni - 2000
86 An Immunological Model of Distributed Detection and Its Application to Computer Security – Steven Andrew Hofmeyr - 1999
Behavioral feature Extraction for NETWORK ANOMALY DETECTION – James P. Early - 2005
128 Architecture for an Artificial Immune System – Steven A. Hofmeyr, S. Forrest - 2000
292 Intrusion Detection using Sequences of System Calls – Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji - 1998
26 Using Internal Sensors For Computer Intrusion Detection – Diego Zamboni - 2001
23 Automated Discovery of Concise Predictive Rules for Intrusion Detection – Guy Helmer, Johnny S. K. Wong, Vasant Honavar, Les Miller - 2000
3 Machine Learning Techniques for the Domain of Anomaly Detection for Computer Security – Terran Lane - 1998
2 Lightweight intrusion detection for networked operating systems – Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji
5 Distributed Pattern Detection for Intrusion Detection – Christopher Krügel, Thomas Toth - 2002
46 Research in Intrusion-Detection Systems: A Survey – Stefan Axelsson - 1998
31 Immunity-Based Intrusion Detection System: A General Framework – Dipankar Dasgupta
12 Data Mining Methods for Network Intrusion Detection – S Terry Brugger - 2004
62 Lightweight Agents for Intrusion Detection – Guy G. Helmer, Johnny S. K. Wong, Vasant Honavar, Les Miller - 2003
6 INTRUSION DETECTION: A SURVEY – Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava - 2005
34 Machine Learning Techniques for the Computer Security Domain of Anomaly Detection – Terran D. Lane - 2000
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System Abstract – Mohamad Eid, Hassan Artail, Ayman Kayssi, Ali Chehab, Corresponding Hassan Artail - 2006
13 Decentralized Event Correlation for Intrusion Detection – Christopher Krügel, Thomas Toth, Clemens Kerer - 2001