RAID A

14 papers

YearTitle / Authors
2003Ambiguity Resolution via Passive OS Fingerprinting.
Greg Taleck
2003An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
Matthew V. Mahoney, Philip K. Chan
2003An Approach for Detecting Self-propagating Email Using Anomaly Detection.
Ajay Gupta, R. Sekar
2003Characterizing the Performance of Network Intrusion Detection Sensors.
Lambert Schaelicke, Thomas Slabach, Branden J. Moore, Curt Freeland
2003Correlation of Intrusion Symptoms: An Application of Chronicles.
Benjamin Morin, Hervé Debar
2003Detecting Anomalous Network Traffic with Self-organizing Maps.
Manikantan Ramadas, Shawn Ostermann, Brett C. Tjaden
2003Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller.
Marcus Tylutki, Karl N. Levitt
2003Modeling Computer Attacks: An Ontology for Intrusion Detection.
Jeffrey Undercoffer, Anupam Joshi, John Pinkston
2003Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings
Giovanni Vigna, Erland Jonsson, Christopher Krügel
2003Statistical Causality Analysis of INFOSEC Alert Data.
Xinzhou Qin, Wenke Lee
2003Topology-Based Detection of Anomalous BGP Messages.
Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
2003Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems.
Sung-Bae Cho, Sang-Jun Han
2003Using Decision Trees to Improve Signature-Based Intrusion Detection.
Christopher Krügel, Thomas Toth
2003Using Specification-Based Intrusion Detection for Automated Response.
Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt