Intention Modelling: Approximating Computer User Intentions for Detection and Prediction of Intrusions (1996)

Cached

Download Links

by T. Spyrou , J. Darzentas
Venue:IN: S.K. KATSIKAS, D. GRITZALIS (EDS.), INFORMATION SYSTEM SECURITY, SAMOS, GREEZE
Citations:13 - 0 self

Active Bibliography

Host-Based Misuse Detection and . . . – Katherine E. Price - 1997
Host-Based Misuse Detection and Conventional . . . – Katherine E. Price - 1997
46 Research in Intrusion-Detection Systems: A Survey – Stefan Axelsson - 1998
35 A Revised Taxonomy for Intrusion-Detection Systems – Herve Debar, Marc Dacier, Andreas Wespi
164 Intrusion Detection Systems: A Survey and Taxonomy – Stefan Axelsson - 2000
1 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun Richard, Richard A. Kemmerer, Phillip A. Porras - 1995
275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995
37 Computer System Intrusion Detection: A Survey – Anita K. Jones, Robert S. Sielken - 1999
Community Epidemic Detection with Syzygy – Adam J. Oliner, Ashutosh Kulkarni, Alex Aiken
2 Community Epidemic Detection using Time-Correlated Anomalies – Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
1 Probabilistic Approaches to Fraud Detection РJaakko Hollm̩n, Jaakko Hollmn, Jaakko Hollmn - 1999
unknown title – unknown authors
82 The Base-Rate Fallacy and the Difficulty of Intrusion Detection – Stefan Axelsson - 2000
133 Classification And Detection Of Computer Intrusions – Sandeep Kumar - 1995
3 Machine Learning Techniques for the Domain of Anomaly Detection for Computer Security – Terran Lane - 1998
62 A Methodology for Testing Intrusion Detection Systems – Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson - 1996
34 Machine Learning Techniques for the Computer Security Domain of Anomaly Detection – Terran D. Lane - 2000
95 Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST) – Ulf Lindqvist, Phillip A. Porras - 1999
6 INTRUSION DETECTION: A SURVEY – Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava - 2005