Abstract is missing.
- Better Logging through FormalityChapman Flack, Mikhail J. Atallah. 1-16 [doi]
- A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential IntrusionsJosué Kuri, Gonzalo Navarro, Ludovic Mé, Laurent Heye. 17-27 [doi]
- Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion DetectionJoachim Biskup, Ulrich Flegel. 28-48 [doi]
- A Data Mining and CIDF Based Approach for Detecting Novel and Distributed IntrusionsWenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo. 49-65 [doi]
- Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary ReportChristoph C. Michael, Anup K. Ghosh. 66-79 [doi]
- Adaptive, Model-Based Monitoring for Cyber Attack DetectionAlfonso Valdes, Keith Skinner. 80-92 [doi]
- A Real-Time Intrusion Detection System Based on Learning Program BehaviorAnup K. Ghosh, Christoph C. Michael, Michael Schatz. 93-109 [doi]
- Intrusion Detection Using Variable-Length Audit Trail PatternsAndreas Wespi, Marc Dacier, Hervé Debar. 110-129 [doi]
- Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA ObjectsZakia Marrakchi, Ludovic Mé, Bernard Vivinis, Benjamin Morin. 130-144 [doi]
- The 1998 Lincoln Laboratory IDS EvaluationJohn McHugh. 145-161 [doi]
- Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection EvaluationRichard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das. 162-182 [doi]
- Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection SystemsDominique Alessandri. 183-196 [doi]
- LAMBDA: A Language to Model a Database for Detection of AttacksFrédéric Cuppens, Rodolphe Ortalo. 197-216 [doi]
- Target Naming and Service ApoptosisJames Riordan, Dominique Alessandri. 217-226 [doi]