|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996466061303316 |
|
|
Titolo |
Recent Advances in Intrusion Detection [[electronic resource] ] : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2003.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 242 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 2820 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Management information systems |
Computer science |
Data encryption (Computer science) |
Computer communication systems |
Operating systems (Computers) |
Computers and civilization |
Management of Computing and Information Systems |
Cryptology |
Computer Communication Networks |
Computer Science, general |
Operating Systems |
Computers and Society |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling |
|
|
|
|
|
|
|
|
|
|
Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. |
|
|
|
|
|
| |