"Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector
- 24 August 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 6, 188-201
- https://doi.org/10.1109/secpri.2002.1004371
Abstract
No abstract availableThis publication has 8 references indexed in Scilit:
- Detecting intrusions using system calls: alternative data modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- An immunological approach to change detection: algorithms, analysis and implicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Self-nonself discrimination in a computerPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Benchmarking anomaly-based detection systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Anomaly detection in embedded systemsIEEE Transactions on Computers, 2002
- Characterizing the behavior of a program using multiple-length N-gramsPublished by Association for Computing Machinery (ACM) ,2001
- Intrusion detection for distributed applicationsCommunications of the ACM, 1999
- Intrusion detection using sequences of system callsJournal of Computer Security, 1998