Detecting Intruders in Computer Systems (1993)

by Teresa Lunt
Venue:In Proceedings of the 1993 Conference on Auditing and Computer Technology
Citations:56 - 0 self

Documents Related by Co-Citation

275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995
320 Data Mining Approaches for Intrusion Detection – Wenke Lee, Salvatore J. Stolfo
354 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
530 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
123 Discovering Generalized Episodes Using Minimal Occurrences – Heikki Mannila, Hannu Toivonen - 1996
85 Mining audit data to build intrusion detection models – Wenke Lee, Salvatore J. Stolfo, Kui W. Mok - 1998
116 Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring – Calvin Ko, George Fink, Karl Levitt - 1994
71 A Software Architecture to support Misuse Intrusion Detection – Sandeep Kumar, Eugene H. Spafford - 1995
66 A realtime intrusion detection expert system (IDES) ± Final – T F Lunt, A Tamaru, F Gilham, R Jagannathan, P G Neumann, H S Javitz, A Valdes, T D Garvey - 1992
969 Fast Effective Rule Induction – William W. Cohen - 1995
686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
2418 Mining Association Rules between Sets of Items in Large Databases – Rakesh Agrawal, Tomasz Imielinski, Arun Swami - 1993
86 Toward parallel and distributed learning by meta-learning – Philip K. Chan, Salvatore J. Stolfo - 1993
45 libpcap, available via anonymous ftp to ftp.ee.lbl.gov – S McCanne, C Leres, V Jacobson - 1994
83 The architecture of a network level intrusion detection system – R Heady, G Luger, A Maccabe, M Servilla - 1990
161 Temporal sequence learning and data reduction for anomaly detection – Terran Lane, Carla E. Brodley - 1999
2655 Fast Algorithms for Mining Association Rules – Rakesh Agrawal, Ramakrishnan Srikant - 1994
75 Adaptive real-time anomaly detection using inductively generated sequential patterns – H S Teng, K Chen, S C-Y Lu - 1990
334 Detecting intrusion using system calls: alternative data models – Christina Warrender, Stephanie Forrest, Barak Pearlmutter - 1999