Friday 26 October 2012

[19] T. Lane and C.E. Brodley. Temporal sequence learning
and data reduction for anomaly detection. In
Proceedings of the 5th ACM conference on Computer
and communications security, pages 150–158. ACM
Press, 1998.
[20] W. Lee and S. Stolfo. A Framework for Constructing
Features and Models for Intrusion Detection Systems.
ACM Transactions on Information and System
Security, 3(4), November 2000.
[21] W. Lee, S. Stolfo, and K. Mok. Mining in a Data-flow
Environment: Experience in Network Intrusion
Detection. In Proceedings of the 5th ACM SIGKDD
International Conference on Knowledge Discovery &
Data Mining (KDD ’99), San Diego, CA, August 1999.
[22] J. Liberty and D. Hurwitz. Programming ASP.NET.
O’REILLY, February 2002.
[23] U. Lindqvist and P.A. Porras. Detecting Computer and
Network Misuse with the Production-Based Expert
System Toolset (P-BEST). In IEEE Symposium on
Security and Privacy, pages 146–161, Oakland,
California, May 1999.
[24] Miva HtmlScript. http://www.htmlscript.com/.
[25] V. Paxson. Bro: A System for Detecting Network
Intruders in Real-Time. In Proceedings of the 7th
USENIX Security Symposium, San Antonio, TX,
January 1998.
[26] Phorum: PHP Message Board.
http://www.phorum.org/.
[27] PHP Advisory Homepage.
http://www.phpadvisory.com/, 2002.
[28] M. Roesch. Snort - Lightweight Intrusion Detection for
Networks. In Proceedings of the USENIX LISA ’99
Conference, November 1999.
[29] Security Focus Homepage.
http://www.securityfocus.com/, 2002.
[30] Andreas Stolcke and Stephen Omohundro. Hidden
Markov Model Induction by Bayesian Model Merging.
Advances in Neural Information Processing Systems,
1993.
[31] Andreas Stolcke and Stephen Omohundro. Inducing
Probabilistic Grammars by Bayesian Model Merging.
In Conference on Grammatical Inference, 1994.
[32] K. Tan and R. Maxion. ”Why 6?” Defining the
Operational Limits of Stide, an Anomaly-Based
Intrusion Detector. In Proceedings of the IEEE
Symposium on Security and Privacy, pages 188–202,
Oakland, CA, May 2002.
[33] Robert Tarjan. Depth-First Search and Linear Graph
Algorithms. SIAM Journal of Computing, 1(2):10–20,
June 1972.
[34] Security Tracker. Vulnerability statistics April
2001-march 2002. http://www.securitytracker.com/
learn/statistics.html, April 2002.
[35] N. Ye, Y. Zhang, and C. M. Borror. Robustness of the
Markov chain model for cyber attack detection. IEEE

No comments:

Post a Comment