Abstract is missing.
- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative ControllerMarcus Tylutki, Karl N. Levitt. 1-16 [doi]
- Topology-Based Detection of Anomalous BGP MessagesChristopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur. 17-35 [doi]
- Detecting Anomalous Network Traffic with Self-organizing MapsManikantan Ramadas, Shawn Ostermann, Brett C. Tjaden. 36-54 [doi]
- An Approach for Detecting Self-propagating Email Using Anomaly DetectionAjay K. Gupta 0002, R. Sekar. 55-72 [doi]
- Statistical Causality Analysis of INFOSEC Alert DataXinzhou Qin, Wenke Lee. 73-93 [doi]
- Correlation of Intrusion Symptoms: An Application of ChroniclesBenjamin Morin, Hervé Debar. 94-112 [doi]
- Modeling Computer Attacks: An Ontology for Intrusion DetectionJeffrey Undercoffer, Anupam Joshi, John Pinkston. 113-135 [doi]
- Using Specification-Based Intrusion Detection for Automated ResponseIvan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt. 136-154 [doi]
- Characterizing the Performance of Network Intrusion Detection SensorsLambert Schaelicke, Thomas Slabach, Branden J. Moore, Curt Freeland. 155-172 [doi]
- Using Decision Trees to Improve Signature-Based Intrusion DetectionChristopher Krügel, Thomas Toth. 173-191 [doi]
- Ambiguity Resolution via Passive OS FingerprintingGreg Taleck. 192-206 [doi]
- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection SystemsSung-Bae Cho, Sang-Jun Han. 207-219 [doi]
- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly DetectionMatthew V. Mahoney, Philip K. Chan. 220-237 [doi]