121![Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1 Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1 Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi](https://www.pdfsearch.io/img/6e6002e2223bebe1b12bcf774d109d44.jpg) | Add to Reading ListSource URL: www.cs.iastate.eduLanguage: English - Date: 2005-08-08 19:37:58
|
---|
122![Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation](https://www.pdfsearch.io/img/9cc228f72dd1f691944aca2a44335b59.jpg) | Add to Reading ListSource URL: www.cs.iastate.eduLanguage: English - Date: 2006-01-26 18:38:00
|
---|
123![Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut Noname manuscript No. (will be inserted by the editor) A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System Guy Helmer, Johnny Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn Lut](https://www.pdfsearch.io/img/ef9cab80bd176a06cf1236692962dbf2.jpg) | Add to Reading ListSource URL: www.cs.iastate.eduLanguage: English - Date: 2002-09-10 02:20:42
|
---|
124![IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas](https://www.pdfsearch.io/img/af5beeb07eb883e59e98d93669dc4660.jpg) | Add to Reading ListSource URL: www.nsa.govLanguage: English - Date: 2014-01-08 14:04:38
|
---|
125![Intrusion Detection Systems Correlation: a Weapon of Mass Investigation Intrusion Detection Systems Correlation: a Weapon of Mass Investigation](https://www.pdfsearch.io/img/245fb0f60bf0e7690346a542666801fb.jpg) | Add to Reading ListSource URL: cansecwest.comLanguage: English - Date: 2008-06-12 15:35:32
|
---|
126![Anomaly Pattern Detection in Categorical Datasets Kaustav Das Machine Learning Department Carnegie Mellon University Pittsburgh PA 15203 Anomaly Pattern Detection in Categorical Datasets Kaustav Das Machine Learning Department Carnegie Mellon University Pittsburgh PA 15203](https://www.pdfsearch.io/img/349181a5b4398868f0078b40de935114.jpg) | Add to Reading ListSource URL: www.cs.cmu.eduLanguage: English - Date: 2008-10-22 16:33:27
|
---|
127![Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John Int. J. Information and Computer Security, Vol. 1, No. 1/2, 2007 Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems Guy Helmer†, John](https://www.pdfsearch.io/img/9cd2c2864c0f0cd95a8a327b7dee91d1.jpg) | Add to Reading ListSource URL: www.cs.iastate.eduLanguage: English - Date: 2007-10-07 21:16:46
|
---|
128![The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo The Journal of Systems and Software–14 www.elsevier.com/locate/jss Towards the automatic generation of mobile agents for distributed intrusion detection system Yanxin Wang *, Smruti Ranjan Behera, Johnny Wo](https://www.pdfsearch.io/img/7a1978f3eb1ee8d1e2c1c7d6326189a2.jpg) | Add to Reading ListSource URL: www.cs.iastate.eduLanguage: English - Date: 2006-06-01 02:53:24
|
---|
129![Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004 Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004](https://www.pdfsearch.io/img/9f8b26b6d473eba9a8ede5dd146b0d85.jpg) | Add to Reading ListSource URL: bitblaze.cs.berkeley.eduLanguage: English - Date: 2013-03-28 20:19:29
|
---|
130![Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org Advanced Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org](https://www.pdfsearch.io/img/b0c67419445bef51bcda9af9c7e19b7a.jpg) | Add to Reading ListSource URL: www.cipherdyne.orgLanguage: English - Date: 2013-11-03 15:37:36
|
---|