Document - eBookmela
Loading...

Recent advances in intrusion detection : third international workshop, RAID 2000, Toulouse, France, October 2 | RAID 2000 (2000 : Toulouse, France), Debar, Hervé, 1961-, Mé, Ludovic, 1963-, Wu, S. Felix, 1963-

Likes0
Telegram icon Share on Telegram
Just a moment...
" id="short-url-input" readonly>

Recent advances in intrusion detection : third international workshop, RAID 2000, Toulouse, France, October 2

User Rating: Be the first one!

Author: RAID 2000 (2000 : Toulouse, France), Debar, Hervé, 1961-, Mé, Ludovic, 1963-, Wu, S. Felix, 1963-

Added by: sketch

Added Date: 2015-12-30

Publication Date: 2000

Language: eng

Subjects: Computer security, Computers

Publishers: Berlin ; New York : Springer

Collections: journals contributions, journals

ISBN Number: 3540410856

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 106.99 MB

PDF Size: 2.75 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Edition: [Elektronische Ressource]

Archive Url

Downloads: 701

Views: 751

Total Files: 18

Media Type: texts

Description

Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings
Author: Hervé Debar, Ludovic Mé, S. Felix Wu
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41085-0
DOI: 10.1007/3-540-39945-3

Table of Contents:

  • Better Logging through Formality
  • A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions
  • Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
  • A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions
  • Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report
  • Adaptive, Model-Based Monitoring for Cyber Attack Detection
  • A Real-Time Intrusion Detection System Based on Learning Program Behavior
  • Intrusion Detection Using Variable-Length Audit Trail Patterns
  • Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects
  • The 1998 Lincoln Laboratory IDS Evaluation
  • Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
  • Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems
  • LAMBDA: A Language to Model a Database for Detection of Attacks
  • Target Naming and Service Apoptosis

Includes bibliographical references and index
eBookmela
Logo
Register New Account