On a Pattern-Oriented Model for Intrusion Detection.
Shiuh-Pyng Shieh, Virgil D. Gligor:
On a Pattern-Oriented Model for Intrusion Detection.
IEEE Trans. Knowl. Data Eng. 9(4): 661-667(1997)@article{DBLP:journals/tkde/ShiehG97,
author = {Shiuh-Pyng Shieh and
Virgil D. Gligor},
title = {On a Pattern-Oriented Model for Intrusion Detection},
journal = {IEEE Trans. Knowl. Data Eng.},
volume = {9},
number = {4},
year = {1997},
pages = {661-667},
ee = {db/journals/tkde/ShiehG97.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Copyright © 1997 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
BibTeX
References
- [1]
- ...
- [2]
- ...
- [3]
- ...
- [4]
- ...
- [5]
- ...
- [6]
- ...
- [7]
- ...
- [8]
- Dorothy E. Denning:
An Intrusion-Detection Model.
IEEE Trans. Software Eng. 13(2): 222-232(1987) BibTeX
- [9]
- ...
- [10]
- Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan:
Design and Implementation of Secure Xenix.
IEEE Trans. Software Eng. 13(2): 208-221(1987) BibTeX
- [11]
- Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras:
State Transition Analysis: A Rule-Based Intrusion Detection Approach.
IEEE Trans. Software Eng. 21(3): 181-199(1995) BibTeX
- [12]
- H. S. Javitz, A. Valdes:
The SRI IDES Statistical Anomaly Detector.
IEEE Symposium on Security and Privacy 1991: 316-326 BibTeX
- [13]
- ...
- [14]
- ...
- [15]
- Shiuh-Pyng Shieh, Virgil D. Gligor:
A Pattern-Oriented Intrusion-Detection Model and Its Applications.
IEEE Symposium on Security and Privacy 1991: 327-342 BibTeX
- [16]
- ...
- [17]
- ...
- [18]
- Lawrence Snyder:
Theft and Conspiracy in the Take-Grant Protection Model.
J. Comput. Syst. Sci. 23(3): 333-347(1981) BibTeX
- [19]
- H. S. Teng, K. Chen, S. C. Y. Lu:
Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns.
IEEE Symposium on Security and Privacy 1990: 278-284 BibTeX
- [20]
- H. S. Vaccaro, Gunar E. Liepins:
Detection of Anomalous Computer Session Activity.
IEEE Symposium on Security and Privacy 1989: 280-289 BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:52 2009