Next: Index
Up: csahtml
Previous: 5.7 Discussion
-
- 1
-
Amoroso, E. (1999).
Intrusion Detection: An Introduction to Internet Surveillance,
Correlation, Trace Back, Traps, and Response.
Intrusion.net Books, Sparta, New Jersey.
- 2
-
Anderson, D., Lunt, T. F., Javitz, H., Tamaru, A., and Valdes, A. (1995).
Detecting unusual program behavior using the statistical component of
the next-generation intrusion detection expert system (nides).
Technical Report SRI-CSL-95-06, SRI International.
- 3
-
anonymous (1997).
Maximum Security.
Sams.net Publishing, Indianapolis, IN.
- 4
-
Bace, R. G. (2000).
Intrusion Detection.
MacMillan Technical Publishing, Indianapolis.
- 5
-
Bleha, S., Slivinsky, C., and Hussien, B. (1990).
Computer-access security systems using keystroke dynamics.
IEEE Transactions on Pattern Analysis and Machine Intelligence,
12(12):1217-1222.
- 6
-
DeVault, K., Tucey, N., and Marchette, D. (2003).
Analyzing process table and window title data for user identification
in a windows environment.
Technical Report NSWCDD/TR-03/122, Naval Surface Warfare Center.
- 7
-
Early, J. P. and Brodley, C. E. (2003).
Behavioral authentication of server flows.
In The 19th Annual Computer Security Applications Conference.
to appear.
- 8
-
Escamilla, T. (1998).
Intrusion Detection: Network Security Beyond the Firewall.
John Wiley & Sons, Inc., New York.
- 9
-
Forrest, S. and Hofmeyr, S. A. (In press).
Immunology as information processing.
In Segel, L. A. and Cohen, I., editors, Design Prinicples for
the Immune System and Other Distributed Autonomous Systems, Santa Fe
Institute Studies in the Sciences of Complexity. Oxford University Press,
Oxford, UK.
Also available at www.cs.unm.edu/forrest/ism_papers.htm.
- 10
-
Forrest, S., Hofmeyr, S. A., and Somayaji, A. (1997).
Computer immunology.
Communications of the ACM, 40:88-96.
- 11
-
Forrest, S., Perelson, A. S., Allen, L., and Cherukuri, R. (1994).
Self-nonself discrimination in a computer.
In 1994 IEEE Symposium on Research in Security and Privacy.
Also available at www.cs.unm.edu/forrest/isa_papers.htm.
- 12
-
Giles, K., Marchette, D. J., and Priebe, C. E. (2003).
A backscatter characterization of denial-of-service attacks.
In Proceedings of the Joint Statistical Meetings.
to appear.
- 13
-
Karonski, M., Singer, K., and Scheinerman, E. (1999).
Random intersection graphs: the subgraph problem.
Combinatorics, Probability and Computing, 8:131-159.
- 14
-
Kephart, J. O. and White, S. R. (1991).
Directed-graph epidemiological models of computer viruses.
In Proceedings of the IEEE Computer Society Symposium on
Research in Security and Privacy, pages 343-359.
- 15
-
Kephart, J. O. and White, S. R. (1993).
Measuring and modeling computer virus prevalence.
In Proceedings of the IEEE Computer Society Symposium on
Research in Security and Privacy, pages 2-15.
- 16
-
Lin, D.-T. (1997).
Computer-access authentication with neural network based keystroke
identity verification.
In International Conference on Neural Networks, pages 174-178.
- 17
-
Marchette, D. J.
Passive detection of denial of service attacks on the internet.
In Chen, W., editor, Statistical Methods in Computer Security.
Marcel Dekker.
to appear.
- 18
-
Marchette, D. J. (2001).
Computer Intrusion Detection and Network Monitoring: A
Statistical Viewpoint.
Springer, New York.
- 19
-
Marchette, D. J. (2002).
A study of denial of service attacks on the internet.
In Proceedings of the Army Conference on Applied Statistics, pages 41-60.
- 20
-
Marchette, D. J. (2003).
Profiling users by their network activity.
In Proceedings of the Joint Statistical Meetings.
to appear.
- 21
-
Marchette, D. J. (2004).
Random Graphs for Statistical Pattern Recognition.
John Wiley & Sons, New York.
- 22
-
Maxion, R. A. (2003).
Masquerade detection using enriched command lines.
In International conference on dependable systems and
networks(DNS-03). IEEE Computer Society Press.
- 23
-
Maxion, R. A. and Townsend, T. N. (2002).
Masquerade detection using truncated command lines.
In International conference on dependable systems and
networks(DNS-02). IEEE Computer Society Press.
- 24
-
Moore, D., Voelker, G. M., and Savage, S. (2001).
Infering Internet denial-of-service activity.
Available on the web at
www.usenix.org/publications/library/ proceedings/sec01/moore.html.
USENIX Security '01.
- 25
-
Northcutt, S., Novak, J., and McLaclan, D. (2001).
Network Intrusion Detection. An Analyst's Handbook.
New Riders, Indianapolis.
- 26
-
Obaidat, M. S. and Sadoun, B. (1997).
Verification of computer users using keystroke dynamics.
IEEE Transactions on Systems, Man, and Cybernetics,
27(2):261-269.
- 27
-
Priebe, C. E. (1994).
Adaptive mixture density estimation.
Journal of the American Statistical Association, 89:796-806.
- 28
-
Proctor, P. E. (2001).
The Practical Intrusion Detection Handbook.
Prentice-Hall, Englewood Cliffs, NJ.
- 29
-
Robinson, J. A., Liang, V. M., Chambers, J. A. M., and MacKenzie, C. L. (1998).
Computer user verification using login string keystroke dynamics.
IEEE Transactions on Systems, Man, and Cybernetics,
28(2):236-241.
- 30
-
Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A. F., Theus, M., and Vardi, Y.
(2001).
Computer intrusion: Detecting masquerades.
Statistical Science, 16:58-74.
- 31
-
Song, D. X., Wagner, D., and Tian, X. (2001).
Timing analysis of keystrokes and timing attacks on SSH.
In Proceedings of the 10th USENIX Security Symposium.
http://www.usenix.org/publications/library/proceedings/sec01/song.html.
- 32
-
Stevens, W. R. (1994).
TCP/IP Illustrated, Volume 1: The Protocols.
Addison-Wesley, Reading.
- 33
-
Tan, K. M. C. and Maxion, R. A. (2002).
``why 6?'' defining the operational limits of stide, an anomaly-based
intrusion detector.
In IEEE Symposium on Security and Privacy. IEEE Computer
Society Press.
- 34
-
Wegman, E. J. and Davies, H. I. (1979).
Remarks on some recursive estimators of a probability density.
Annals of Statistics, 7:316-327.
- 35
-
Wegman, E. J. and Dorfman, A. (2001).
Visualizing cereal world.
Technical Report TR 178, George Mason University, Center for
Computational Statistics.
- 36
-
Wegman, E. J. and Marchette, D. J. (2003).
On some techniques for streaming data: a case study of Internet
packet headers.
JCGS, 12(4):893-914.
- 37
-
Wierman, J. C. and Marchette, D. J. (2004).
Modeling computer virus prevalence with a
susceptible-infected-susceptible model with reintroduction.
Computational Statistics and Data Analysis, 45(1):3-23.
- 38
-
Wilhelm, A. F. X., Wegman, E. J., and Symanzik, J. (1999).
Visual clustering and classification: The oronsay particle size data
set revisited.
Computational Statistics, pages 109-146.
- 39
-
Yamato, H. (1971).
Sequential estimation of a continuous probability density function
and the mode.
Bulletin of Mathematical Statistics, 14:1-12.