1![PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS DAMIANO BOLZONI, SANDRO ETALLE AND PIETER HARTEL DISTRIBUTED AND EMBEDDED SECURITY GROUP TWENTE SECURITY LAB PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS DAMIANO BOLZONI, SANDRO ETALLE AND PIETER HARTEL DISTRIBUTED AND EMBEDDED SECURITY GROUP TWENTE SECURITY LAB](https://www.pdfsearch.io/img/03e3ef25dedf6196d04e1f3311bab7cc.jpg) | Add to Reading ListSource URL: www.rennes.supelec.frLanguage: English - Date: 2009-10-01 09:50:26
|
---|
2![Performance Analysis of Content Matching Intrusion Detection Systems S. Antonatos, K. G. Anagnostakis†, E. P. Markatos , M. Polychronakis∗ † Institute of Computer Science Performance Analysis of Content Matching Intrusion Detection Systems S. Antonatos, K. G. Anagnostakis†, E. P. Markatos , M. Polychronakis∗ † Institute of Computer Science](https://www.pdfsearch.io/img/fc4dd095a346cec7956b98db3e0ceedb.jpg) | Add to Reading ListSource URL: dcs.ics.forth.gr- Date: 2012-03-22 09:28:01
|
---|
3![Improving the Accuracy of Network Intrusion Detection Systems Under Load Using Selective Packet Discarding Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science, Foundation Improving the Accuracy of Network Intrusion Detection Systems Under Load Using Selective Packet Discarding Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science, Foundation](https://www.pdfsearch.io/img/a815d0f21867ad861a595d61c98084f5.jpg) | Add to Reading ListSource URL: www.ics.forth.gr- Date: 2012-03-22 09:27:59
|
---|
4![Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University](https://www.pdfsearch.io/img/67a362499305b426c4efa13ac17e435e.jpg) | Add to Reading ListSource URL: homeostasis.scs.carleton.ca- Date: 2007-01-02 10:18:15
|
---|
5![Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller Sibin Mohan Dept. of Computer Science Dept. of Computer Science North Carolina State University, Raleigh, NC Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller Sibin Mohan Dept. of Computer Science Dept. of Computer Science North Carolina State University, Raleigh, NC](https://www.pdfsearch.io/img/2dffc10930d38b5573b8e0284ac2b6a0.jpg) | Add to Reading ListSource URL: moss.csc.ncsu.edu- Date: 2010-03-29 18:00:23
|
---|
6![](/pdf-icon.png) | Add to Reading ListSource URL: netcom.army.mil- Date: 2009-10-26 18:26:12
|
---|
7![Anomaly-Based Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development Anomaly-Based Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development](https://www.pdfsearch.io/img/27e64d5b75aa6e7f600127790d25b251.jpg) | Add to Reading ListSource URL: www.icsd.aegean.gr- Date: 2013-11-25 06:34:42
|
---|
8![This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back This paper will appear at the 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, June 21–25, 2010 Empirical Study of a National-Scale Distributed Intrusion Detection System: Back](https://www.pdfsearch.io/img/ba389f7791f1369a996e08ed4f4adf68.jpg) | Add to Reading ListSource URL: www.cs.unm.edu- Date: 2010-04-09 00:32:36
|
---|
9![BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology](https://www.pdfsearch.io/img/55ceb5d5676366962555ca9db354554f.jpg) | Add to Reading ListSource URL: www.cyber-ta.orgLanguage: English - Date: 2007-06-29 16:14:13
|
---|
10![Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43 Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43](https://www.pdfsearch.io/img/a5c4b0256f3f6acbe19f33fc94d33a0c.jpg) | Add to Reading ListSource URL: norbert-pohlmann.comLanguage: English - Date: 2015-10-20 12:57:31
|
---|