Recent advances in intrusion detection : third international workshop, RAID 2000, Toulouse, France, October 2
User Rating: Be the first one!
Author: RAID 2000 (2000 : Toulouse, France), Debar, Hervé, 1961-, Mé, Ludovic, 1963-, Wu, S. Felix, 1963-
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Computer security, Computers
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540410856
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 106.99 MB
PDF Size: 2.75 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Edition: [Elektronische Ressource]
Downloads: 701
Views: 751
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 3 540 39945 3 archive t...torrent
Last Modified: 2023-05-26 03:10:45
Download
Size: 8.28 KB
Description
Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings
Author: Hervé Debar, Ludovic Mé, S. Felix Wu
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41085-0
DOI: 10.1007/3-540-39945-3
Table of Contents:
Includes bibliographical references and index
Author: Hervé Debar, Ludovic Mé, S. Felix Wu
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41085-0
DOI: 10.1007/3-540-39945-3
Table of Contents:
- Better Logging through Formality
- A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions
- Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
- A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions
- Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report
- Adaptive, Model-Based Monitoring for Cyber Attack Detection
- A Real-Time Intrusion Detection System Based on Learning Program Behavior
- Intrusion Detection Using Variable-Length Audit Trail Patterns
- Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects
- The 1998 Lincoln Laboratory IDS Evaluation
- Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
- Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems
- LAMBDA: A Language to Model a Database for Detection of Attacks
- Target Naming and Service Apoptosis
Includes bibliographical references and index
You May Also Like
We will be happy to hear your thoughts