ACM SIGMOD Anthology TKDE dblp.uni-trier.de

On a Pattern-Oriented Model for Intrusion Detection.

Shiuh-Pyng Shieh, Virgil D. Gligor: On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667(1997)
@article{DBLP:journals/tkde/ShiehG97,
  author    = {Shiuh-Pyng Shieh and
               Virgil D. Gligor},
  title     = {On a Pattern-Oriented Model for Intrusion Detection},
  journal   = {IEEE Trans. Knowl. Data Eng.},
  volume    = {9},
  number    = {4},
  year      = {1997},
  pages     = {661-667},
  ee        = {db/journals/tkde/ShiehG97.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Copyright © 1997 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


BibTeX

References

[1]
...
[2]
...
[3]
...
[4]
...
[5]
...
[6]
...
[7]
...
[8]
Dorothy E. Denning: An Intrusion-Detection Model. IEEE Trans. Software Eng. 13(2): 222-232(1987) BibTeX
[9]
...
[10]
Virgil D. Gligor, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, N. Vasudevan: Design and Implementation of Secure Xenix. IEEE Trans. Software Eng. 13(2): 208-221(1987) BibTeX
[11]
Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Trans. Software Eng. 21(3): 181-199(1995) BibTeX
[12]
H. S. Javitz, A. Valdes: The SRI IDES Statistical Anomaly Detector. IEEE Symposium on Security and Privacy 1991: 316-326 BibTeX
[13]
...
[14]
...
[15]
Shiuh-Pyng Shieh, Virgil D. Gligor: A Pattern-Oriented Intrusion-Detection Model and Its Applications. IEEE Symposium on Security and Privacy 1991: 327-342 BibTeX
[16]
...
[17]
...
[18]
Lawrence Snyder: Theft and Conspiracy in the Take-Grant Protection Model. J. Comput. Syst. Sci. 23(3): 333-347(1981) BibTeX
[19]
H. S. Teng, K. Chen, S. C. Y. Lu: Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. IEEE Symposium on Security and Privacy 1990: 278-284 BibTeX
[20]
H. S. Vaccaro, Gunar E. Liepins: Detection of Anomalous Computer Session Activity. IEEE Symposium on Security and Privacy 1989: 280-289 BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:52 2009