Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
ACM Transactions on Information and System Security (TISSEC)
The 1998 Lincoln Laboratory IDS Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Mining intrusion detection alarms for actionable knowledge
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Clustering intrusion detection alarms to support root cause analysis
ACM Transactions on Information and System Security (TISSEC)
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Intrusion detection alarms reduction using root cause analysis and clustering
Computer Communications
Data mining and machine learning-Towards reducing false positives in intrusion detection
Information Security Tech. Report
Proceedings of the 26th Annual Computer Security Applications Conference
Immunization strategies for networks with scale-free topology
NOLASC'06 Proceedings of the 5th WSEAS international conference on Non-linear analysis, non-linear systems and chaos
IDS false alarm reduction using continuous and discontinuous patterns
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Secure distribution of electronic documents in a hostile environment
Computer Communications
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
ShadowNet: an active defense infrastructure for insider cyber attack prevention
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Hi-index | 0.00 |
As part of our security measures, we spend a fair amount of time and effort looking for things that might otherwise be ignored. Apart from assorted attempted penetrations, we have also discovered many examples of anomalous behavior. These range from excessive ICMP messages to nominally-local broadcast packets that have reached us from around the world.