Abstract is missing.
- Analysis Techniques for Detecting Coordinated Attacks and ProbesJohn Green, David J. Marchette, Stephen Northcutt, Bill Ralph. 1-9 [doi]
- Intrusion Detection and Intrusion Prevention on a Large Network: A Case StudyTom Dunigan, Greg Hinkel. 11-17 [doi]
- An Eye on Network Intruder-Administrator ShootoutsLuc Girardin. 19-28 [doi]
- On Preventing Intrusions by Process Behavior MonitoringR. Sekar, Thomas F. Bowen, Mark E. Segal. 29-40 [doi]
- Intrusion Detection Through Dynamic Software MeasurementSebastian G. Elbaum, John C. Munson. 41-50 [doi]
- Learning Program Behavior Profiles for Intrusion DetectionAnup K. Ghosh, Aaron Schwartzbard, Michael Schatz. 51-62 [doi]
- Automated Intrusion Detection Using NFR: Methods and ExperiencesWenke Lee, Christopher T. Park, Salvatore J. Stolfo. 63-72 [doi]
- Experience with EMERALD to DatePeter G. Neumann, Phillip A. Porras. 73-80 [doi]
- Defending Against the Wily Surfer-Web-based Attacks and DefensesDaniel V. Klein. 81-92 [doi]
- Preprocessor Algorithm for Network Management CodebookMinaxi Gupta, Mani Subramanian. 93-102 [doi]
- The Packet Vault: Secure Storage of Network DataC. J. Antonelli, M. Undy, Peter Honeyman. 103-109 [doi]
- Real-time Intrusion Detection and Suppression in ATM NetworksRiccardo Bettati, Wei Zhao, D. Teodor. 111-118 [doi]
- A Statistical Method for Profiling Network TrafficDavid J. Marchette. 119-128 [doi]
- Transaction-based Anomaly DetectionRoland Büschkes, Mark Borning, Dogan Kesdogan. 129-140 [doi]