Detecting Intruders in Computer Systems (1993)

by Teresa Lunt
Venue:In Proceedings of the 1993 Conference on Auditing and Computer Technology
Citations:56 - 0 self

Active Bibliography

67 Automated Audit Trail Analysis and Intrusion Detection: A Survey – Teresa F. Lunt - 1988
Panoptis: Intrusion Detection using a Domain-specific Language – Diomidis Spinellis, Dimitris Gritzalis, Diomidis Spinellis Þ, Dimitris Gritzalis Ü - 2002
A Domain-specific Language for Intrusion Detection – Diomidis Spinellis, Dimitris Gritzalis - 2000
Host-Based Misuse Detection and . . . – Katherine E. Price - 1997
Host-Based Misuse Detection and Conventional . . . – Katherine E. Price - 1997
Content Modeling Paradigm: An Interplay of Relationship between Author, Document, Topic, and Words – Deepak Gupta - 2010
5 Goal-Oriented Auditing and Logging – Matt Bishop, Christopher Wee, Jeremy Frank - 1996
Behavioral feature Extraction for NETWORK ANOMALY DETECTION – James P. Early - 2005
1 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun Richard, Richard A. Kemmerer, Phillip A. Porras - 1995
275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995
46 Research in Intrusion-Detection Systems: A Survey – Stefan Axelsson - 1998
13 Intention Modelling: Approximating Computer User Intentions for Detection and Prediction of Intrusions – T. Spyrou, J. Darzentas - 1996
5 IDES: The Enhanced Prototype - A Real-Time Intrusion-Detection Expert System – Teresa F. Lunt, R. Jagannathan, Rosanna Lee, Sherry Listgarten, David L. Edwards, Peter G. Neumann, Harold S. Javitz, Al Valdes, Teresa F. Lunt, R. Jagannathan, Rosanna Lee, Sherry Listgarten, David L. Edwards, Peter G. Neumann, Harold S. Javitz, Al Valdes - 1988
10 An overview of computer viruses in a research environment – Matt Bishop - 1992
116 Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring – Calvin Ko, George Fink, Karl Levitt - 1994
2 Verifiable Computer Security and Hardware: Issues – William D. Young - 1991
massachusetts institute of technology, cambridge, ma 02139 usa — www.csail.mit.eduAudit Trails in the Aeolus Distributed Security Platform – Victoria Popic, Victoria Popic, H. Liskov - 2010
UNIX Security in a Supercomputing Environment – Matt Bishop
2 Audit Trails in the Aeolus Distributed Security Platform – Victoria Popic, Barbara H. Liskov - 2010