Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data

Danielle Chrun, Michel Cukier, Gerry Sneeringer. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. In Michael D. Harrison, Mark-Alexander Sujan, editors, Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings. Volume 5219 of Lecture Notes in Computer Science, pages 221-234, Springer, 2008. [doi]

@inproceedings{ChrunCS08:0,
  title = {Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data},
  author = {Danielle Chrun and Michel Cukier and Gerry Sneeringer},
  year = {2008},
  doi = {10.1007/978-3-540-87698-4_20},
  url = {http://dx.doi.org/10.1007/978-3-540-87698-4_20},
  tags = {data-flow},
  researchr = {https://researchr.org/publication/ChrunCS08%3A0},
  cites = {0},
  citedby = {0},
  pages = {221-234},
  booktitle = {Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings},
  editor = {Michael D. Harrison and Mark-Alexander Sujan},
  volume = {5219},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-540-87697-7},
}