Mark Crosbie and Eugene H. Spafford.
Defending a computer system using autonomous agents.
In Proceedings of the 18th National Information Systems Security
Conference, October 1995.
Cheri Dowell and Paul Ramstedt.
The ComputerWatch data reduction tool.
In Proceedings of the 13th National Computer Security
Conference, pages 99-108, October 1990.
Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, and Isabelle Mathieu.
ASAX: Software architecture and rule-based language for universal
audit trail analysis.
In Proceedings of European Symposium on Research in Computer
Security, pages 435-450, November 1992.
Lawrence R. Halme and R. Kenneth Bauer.
AINT misbehaving - a taxonomy of anti-intrusion techniques.
In Proceedings of the 18th National Information Systems Security
Conference, pages 163-172, October 1995.
Lawrence R. Halme and John Van Horne.
Automated analysis of computer system audit trails for security
purposes.
In Proceedings of the 9th National Computer Security
Conference, pages 71-74, September 1986.
Lawrence R. Halme and Brial L. Kahn.
Building a security monitor with adaptive user work profiles.
In Proceedings of the 11th National Computer Security
Conference, pages 274-283, October 1988.
Stephen E. Hansen and Todd Atkins.
Automated system monitoring and notification with Swatch.
In Proceedings of the USENIX Systems Administration (LISA
VII) Conference, pages 145-155, November 1993.
Richard Heady, George Luger, Arthur Maccabe, and Mark Servilla.
The architecture of a network level intrusion detection system.
Technical Report CS90-20, Department of Computer Science, University
of New Mexico, August 1990.
Richard Heady, George Luger, Arthur Maccabe, Mark Servilla, and John
Sturtevant.
The prototype implementation of a network level intrusion detection
system.
Technical Report CS91-11, Department of Computer Science, University
of New Mexico, April 1991.
L. Todd Heberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff
Wood, and David Wolber.
A network security monitor.
In Proceedings of the 1990 IEEE Symposium on Research in
Security and Privacy, pages 296-304, May 1990.
James Hoagland, Christopher Wee, and Karl Levitt.
Audit log analysis using the visual audit browser toolkit.
Technical Report CSE-95-11, Department of Computer Science,
University of California, Davis, September 1995.
Judith Hochberg, Kathleen Jackson, Cathy Stallings, J. F. McClary, David
DuBois, and Josephine Ford.
NADIR: An automated system for detecting network intrusion and
misuse.
Computers & Security, 12(3):235-248, May 1993.
Steven Andrew Hofmeyr.
An Immunological Model of Distributed Detection and its Application to
Computer Security.
Ph.D. Thesis, University of New Mexico, May 1999.
Koral Ilgun.
USTAT: A real-time intrusion detection system for UNIX.
In Proceedings of the IEEE Symposium on Research in Security
and Privacy, pages 16-28, May 1993.
Harold S. Javitz and Alfonso Valdes.
The SRI IDES statistical anomaly detector.
In Proceedings of the IEEE Symposium on Research in Security
and Privacy, pages 316-326, 1991.
Jeffrey D. Kuhn.
Research toward intrusion detection through automated abstraction of
audit data.
In Proceedings of the 9th National Computer Security
Conference, pages 204-208, September 1986.
Sandeep Kumar and Eugene H. Spafford.
A pattern matching model for misuse intrusion detection.
In Proceedings of the 17th National Computer Security
Conference, pages 11-21, October 1994.
Terran Lane and Carla E. Brodley.
Temporal Sequence Learning and Data Reduction for Anomaly Detection.
In Proceedings of the Fifth ACM Conference on Computer and
Communications Security, pages 150-158, 1998.
G. E. Liepins and H. S. Vaccaro.
Anomaly detection: Purpose and framework.
In Proceedings of the 12th National Computer Security
Conference, pages 495-504, October 1989.
Teresa F. Lunt.
IDES: An intelligent system for detecting intruders.
In Proceedings of the Symposium: Computer Security, Treat and
Countermeasures, Rome, Italy, November 1990.
Teresa F. Lunt and R. Jagannathan.
A prototype real-time intrusion-detection expert system.
In Proceedings of the IEEE Symposium on Security and Privacy,
pages 59-66, April 1988.
Teresea F. Lunt.
Automated audit trail analysis and intrusion detection: A survey.
In Proceedings of the 11th National Computer Security
Conference, pages 65-73, October 1988.
Victor H. Marshall.
Intrusion detection in computers.
Booz, Allen & Hamilton Inc., January 1991.
Summary of the Trusted Information Systems (TIS) Report on Intrusion
Detection Systems.
Abdelaziz Mounji and Baudouin Le Charlier.
Continuous assessment of a unix configuration: Integrating intrusion
detection and configuration analysis.
In Proceedings of the the ISOC 1997 Symposium On Network and
Distributed System Security, February 1997.
Abdelaziz Mounji, Baudouin Le Charlier, Denis Zampunieris, and Naji Habra.
Distributed audit trail analysis.
In ISOC '95 Symposium on Network and Distributed System
Security, 1995.
Peter G. Neumann and Donn B. Parker.
A summary of computer misuse techniques.
In Proceedings of the 12th National Computer Security
Conference, pages 396-407, October 1989.
Donn B. Parker.
Demonstrating the elements of information security with threats.
In Proceedings of the 17th National Computer Security
Conference, pages 421-430, 1994.
Paul Proctor.
Audit reduction and misuse detection in heterogeneous environments:
Framework and applications.
In Proceedings of the 10th Annual Computer Security Applications
Conference, pages 117-125, December 1994.
Bill Punch and Douglas Zongker.
lil-gp 1.02 users manual.
Technical report, Computer Sciences Department, Michigan State
University, A-714 Wells Hall, East Lansing, MI 48824, 1996.
Michael M. Sebring, Eric Shellhouse, Mary E. Hanna, and R. Alan Whitehurst.
Expert systems in intrusion detection: A case study.
In Proceedings of the 11th National Computer Security
Conference, pages 74-81, October 1988.
W. Olin Sibert.
Auditing in a distributed system: SunOS MLS audit trails.
In Proceedings of the 11th National Computer Security
Conference, pages 82-90, October 1988.
Stephen E. Smaha.
Haystack: An intrusion detection system.
In Proceedings of the Fourth Aerospace Computer Security
Applications Conference, pages 37-44, December 1988.
Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance L. Goan, Tim Grance,
L. Todd Heberlein, Che-Lin Ho, Karl N. Levitt, Biswanath Mukherjee,
Douglass L. Mansur, Kenneth L. Pon, and Stephen E. Smaha.
A system for distributed intrusion detection.
In COMPCOM Spring '91 Digest of Papers, pages 170-176,
February/March 1991.
M. Sobirey, B. Richter, and H. Konig.
The intrusion detection system AID. architecture, and experiences
in automated audit analysis.
In Proceedings of the IFIP TC6/TC11 International Conference
on Communications and Multimedia Security, pages 278-290, September 1996.
Kymie M. C. Tan.
The Application of Neural Networks to UNIX Computer Security.
Department of Computer Science, University of Melbourne, Parkville
3052, Australia.
H. S. Vaccaro and G. E. Liepins.
Detection of anomalous computer session activity.
In Proceedings of the IEEE Symposium on Research in Security
and Privacy, pages 280-289, 1989.
Gregory B. White, Eric A. Fisch, and Udo W. Pooch.
Cooperating security managers: A peer-based intrusion detection
system.
IEEE Network, 10(1):20-23, January/February 1996.