Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
- 20 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 11 references indexed in Scilit:
- Knowledge-based intrusion detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Penetration state transition analysis: A rule-based intrusion detection approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A neural network component for an intrusion detection systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A sense of self for Unix processesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The SRI IDES statistical anomaly detectorPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A tool for pro-active defense against the buffer overrun attackPublished by Springer Nature ,1998
- Analysis of a denial of service attack on TCPPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1997
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995
- ASAX: Software architecture and rule-based language for universal audit trail analysisPublished by Springer Nature ,1992
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987