![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
3. RAID 2000: Toulouse, France
- Hervé Debar, Ludovic Mé, Shyhtsun Felix Wu:
Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings. Lecture Notes in Computer Science 1907, Springer 2000, ISBN 3-540-41085-6
Logging
- Chapman Flack, Mikhail J. Atallah:
Better Logging through Formality. 1-16 - Josué Kuri, Gonzalo Navarro, Ludovic Mé, Laurent Heye:
A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions. 17-27 - Joachim Biskup, Ulrich Flegel:
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. 28-48
Data Mining
- Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo:
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions. 49-65 - Christoph C. Michael, Anup K. Ghosh:
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. 66-79
Modeling Process Behavior
- Alfonso Valdes, Keith Skinner:
Adaptive, Model-Based Monitoring for Cyber Attack Detection. 80-92 - Anup K. Ghosh, Christoph C. Michael, Michael Schatz:
A Real-Time Intrusion Detection System Based on Learning Program Behavior. 93-109 - Andreas Wespi, Marc Dacier, Hervé Debar:
Intrusion Detection Using Variable-Length Audit Trail Patterns. 110-129 - Zakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin:
Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects. 130-144
IDS Evaluation
- John McHugh:
The 1998 Lincoln Laboratory IDS Evaluation. 145-161 - Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das:
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. 162-182 - Dominique Alessandri:
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems. 183-196
Modeling
- Frédéric Cuppens, Rodolphe Ortalo
:
LAMBDA: A Language to Model a Database for Detection of Attacks. 197-216 - James Riordan, Dominique Alessandri:
Target Naming and Service Apoptosis. 217-226
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.