


default search action
2. RAID 1999: West Lafayette, Indiana, USA
- Recent Advances in Intrusion Detection, Second International Workshop, RAID 1999, West Lafayette, Indiana, USA, September 7-9, 1999. 1999
Session 1
- Christina Yip Chung, Michael Gertz, Karl N. Levitt:
Misuse Detection in Database Systems Through User Profiling. - Christopher Wee:
Audit logs: to keep or not to keep?
Session 2: Agent-based Detection Systems
- Jose Duarte de Queiroz, Luiz F. Rust da Costa Carmo, Luci Pirmez:
Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications. - Peter Mell, Mark McLarnon:
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems. - Eugene H. Spafford, Diego Zamboni:
New directions for the AAFID architecture.
Session 3: Knowledge Engineering and IDS
- Wenke Lee, Salvatore J. Stolfo:
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs. - Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz:
A Data Mining Analysis of RTID Alarms. - Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark R. Heckman, Dave Peticolas, Rick Crawford, Lee A. Benzinger, Sue Rho, Stephen Wu:
Intrusion Detection Inter-component Adaptive Negotiation. - Andreas Wespi, Hervé Debar:
Building an Intrusion-Detection System to Detect Suspicious Process Behavior.
Session 4: IDS and Law
- Glenn Mansfield:
Towards trapping wily intruders in the large.
Session 5: Standards, Assessment, and Lessons Learned
- Vern Paxson:
Defending against network IDS evasion. - Stuart Staniford-Chen:
IDS Standards: Lessons Learned to Date. - Richard Lippmann, Robert K. Cunningham, David J. Fried, Isaac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman:
Results of the DARPA 1998 Offline Intrusion Detection Evaluation. - Tim Farley:
Lessons Learned in Commercial IDS Development. - Terrence G. Champion, Robert Durst:
Air Force Intrusion Detection System Evaluation Environment.
Session 6: Vulnerability Definitions
- Dug Song, G. Shaffer, M. Undy:
Nidsbench - a Network Intrusion Detection Test Suite. - Matt Bishop:
Vulnerability Analysis: An Extended Abstract. - David W. Baker, Steven M. Christey, William H. Hill, David E. Mann:
The Development of a Common Vulnerability Enumeration.
Session 7: Overarching Concerns
- Emilie Lundin, Erland Jonsson:
Privacy vs. Intrusion Detection Analysis. - Stefan Axelsson:
On a Difficulty of Intrusion Detection. - Christopher Ting, Tiang Hwee Ong, Yong Tai Tan, Pek Yong Ng:
Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business Singapore. - David Gorman, Mary Ruhl:
Intrusion Detection for Telephony Signalling. - John Kelsey, Bruce Schneier:
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs.
Session 8
- Alexandr Seleznyov, Seppo Puuronen:
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events. - Richard Lippmann, Robert K. Cunningham:
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. - Yves Cosendai, Marc Dacier, Paolo Scotton:
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks. - Qianli Zhang, Xing Li:
Session State Transition Based Large Network IDS. - Pars Mutaf:
Defending against a Denial-of-Service Attack on TCP.
Session 9
- Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang:
Intrusion Detection for an On-Going Attack. - Jeff Rowe:
Intrusion Detection and Isolation Protocol: Automated Response to Attacks. - Aaron Schwartzbard, Anup K. Ghosh:
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. Recent Advances in Intrusion Detection 1999
Session 10
- Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Christopher Ting:
SNMS - Shadow Network Management System.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.