Danielle Chrun, Michel Cukier, Gerry Sneeringer. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. In Michael D. Harrison, Mark-Alexander Sujan, editors, Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings. Volume 5219 of Lecture Notes in Computer Science, pages 221-234, Springer, 2008. [doi]
@inproceedings{ChrunCS08:0, title = {Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data}, author = {Danielle Chrun and Michel Cukier and Gerry Sneeringer}, year = {2008}, doi = {10.1007/978-3-540-87698-4_20}, url = {http://dx.doi.org/10.1007/978-3-540-87698-4_20}, tags = {data-flow}, researchr = {https://researchr.org/publication/ChrunCS08%3A0}, cites = {0}, citedby = {0}, pages = {221-234}, booktitle = {Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings}, editor = {Michael D. Harrison and Mark-Alexander Sujan}, volume = {5219}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-87697-7}, }