Abstract is missing.
- Detecting Long Connection Chains of Interactive Terminal SessionsKwong H. Yung. 1-16 [doi]
- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable DelayDavid L. Donoho, Ana Georgina Flesia, Umesh Shankar, Vern Paxson, Jason Coit, Stuart Staniford. 17-35 [doi]
- Detecting Malicious Software by Monitoring Anomalous Windows Registry AccessesFrank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo. 36-53 [doi]
- Undermining an Anomaly-Based Intrusion Detection System Using Common ExploitsKymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion. 54-73 [doi]
- Analyzing Intensive Intrusion Alerts via CorrelationPeng Ning, Yun Cui, Douglas S. Reeves. 74-94 [doi]
- A Mission-Impact-Based Approach to INFOSEC Alarm CorrelationPhillip A. Porras, Martin W. Fong, Alfonso Valdes. 95-114 [doi]
- M2D2: A Formal Data Model for IDS Alert CorrelationBenjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé. 115-127 [doi]
- Development of a Legal Framework for Intrusion DetectionSteven R. Johnston. 138-157 [doi]
- Learning Unknown Attacks - A StartJames E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe. 158-176 [doi]
- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection SystemsHervé Debar, Benjamin Morin. 177-198 [doi]
- A Stochastic Model for IntrusionsRobert P. Goldman. 199-218 [doi]
- Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation ToolVladimir I. Gorodetski, Igor V. Kotenko. 219-238 [doi]
- Capacity Verification for High Speed Network Intrusion Detection SystemsMike Hall, Kevin Wiley. 239-251 [doi]
- Performance Adaptation in Real-Time Intrusion Detection SystemsWenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang. 252-273 [doi]
- Accurate Buffer Overflow Detection via Abstract Payload ExecutionThomas Toth, Christopher Krügel. 274-291 [doi]
- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS LevelJacob Zimmermann, Ludovic Mé, Christophe Bidan. 292-306 [doi]
- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion DetectionRichard Lippmann, Seth E. Webster, Douglas Stetson. 307-326 [doi]