Advertisement
Guest User

Untitled

a guest
Nov 19th, 2012
199
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
BibTeX 3.27 KB | None | 0 0
  1. % This file was created with JabRef 2.8.1.
  2. % Encoding: UTF8
  3.  
  4. @MISC{Anderson1980,
  5.  author = {Anderson, James P.},
  6.  title = {{Computer Security Threat Monitoring And Surveillance}},
  7.  year = {1980},
  8.  file = {:home/pista/Documents/Mendeley Desktop/Anderson - 1980 - Computer Security Threat Monitoring And Surveillance.pdf:pdf},
  9.  publisher = {James P. Anderson Co.}
  10. }
  11.  
  12. @MISC{Anderson1980a,
  13.  author = {Anderson, James P.},
  14.  title = {{Computer Security Threat Monitoring And Surveillance}},
  15.  year = {1980},
  16.  file = {:home/pista/Documents/Mendeley Desktop/Anderson - 1980 - Computer Security Threat Monitoring And Surveillance.pdf:pdf},
  17.  publisher = {James P. Anderson Co.}
  18. }
  19.  
  20. @ARTICLE{Bauer1988,
  21.  author = {Bauer, David S. and Koblentz, Michael E.},
  22.  title = {{NIDX-an expert system for real-time network intrusion detection}},
  23.  journal = {Proceedings of the Computer Networking Symposium},
  24.  year = {1988},
  25.  pages = {98--106},
  26.  abstract = {A knowledge-based prototype network intrusion detection expert system
  27.     (NIDX) for the Unix System V environment is described. NIDX combines
  28.     knowledge describing the target system, history profiles of users'
  29.     past activities, and intrusion detection heuristics from a knowledge-based
  30.     system capable of detecting specific violations that occur on the
  31.     target system. Intrusions are detected by classifying user activity
  32.     from a real-time audit trail of Unix system calls and then, using
  33.     system-specific knowledge and heuristics about typical intrusions
  34.     and attack techniques, determining whether or not the activity is
  35.     an intrusion. The authors describe the NIDX knowledge base, and Unix
  36.     system audit trail mechanism and history profiles , and demonstrate
  37.     the knowledge-based intrusion detection process},
  38.  file = {:home/pista/Documents/Mendeley Desktop//Bauer, Koblentz - 1988 - NIDX-an expert system for real-time network intrusion detection.pdf:pdf},
  39.  url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4983 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4983}
  40. }
  41.  
  42. @ARTICLE{Denning1987,
  43.  author = {Denning, Dorothy E.},
  44.  title = {{An Intrusion-Detection Model}},
  45.  journal = {IEEE Transactions on Software Engineering},
  46.  year = {1987},
  47.  volume = {SE-13},
  48.  pages = {222--232},
  49.  number = {2},
  50.  month = feb,
  51.  doi = {10.1109/TSE.1987.232894},
  52.  file = {:home/pista/Documents/Mendeley Desktop/Denning - 1987 - An Intrusion-Detection Model.pdf:pdf},
  53.  issn = {0098-5589},
  54.  url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1702202}
  55. }
  56.  
  57. @ARTICLE{Landwehr1981,
  58.  author = {Landwehr, Carl E.},
  59.  title = {{Formal Models for Computer Security}},
  60.  journal = {ACM Computing Surveys},
  61.  year = {1981},
  62.  volume = {13},
  63.  pages = {247--278},
  64.  number = {3},
  65.  month = sep,
  66.  doi = {10.1145/356850.356852},
  67.  file = {:home/pista/Documents/Mendeley Desktop//Landwehr - 1981 - Formal Models for Computer Security.pdf:pdf},
  68.  issn = {03600300},
  69.  keywords = {0,1,3,35,4,53,56,8,access control,access matrix,aggregation,and phrases,capabilltms,computer,confidentiality,confinement,cr
  70.     categories,data security,information flow,integmty,operating system,privacy,protection,samtlzatlon,security,security
  71.     classes,verification},
  72.  url = {http://portal.acm.org/citation.cfm?doid=356850.356852}
  73. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement