Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008540151/catalog> ?p ?o. }
Showing items 1 to 35 of
35
with 100 items per page.
- catalog abstract "Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.".
- catalog contributor b11947005.
- catalog contributor b11947006.
- catalog contributor b11947007.
- catalog contributor b11947008.
- catalog created "2000.".
- catalog date "2000".
- catalog date "2000.".
- catalog dateCopyrighted "2000.".
- catalog description "Includes bibliographical references and index.".
- catalog description "Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.".
- catalog description "Using finite automata to mine execution data for intrusion detection / Christoph Michael and Anup Ghosh -- Adaptive, model-based monitoring for cyber attack detection / Alfonso Valdes and Keith Skinner -- A real-time intrusion detection system based on learning program behavior / Anup K. Ghosh, Christoph Michael, and Michael Schatz -- Intrusion detection using variable-length audit trail patterns / Andreas Wespi, Marc Dacier, and Herve Debar -- Flexible intrusion detection using variable-length behavior modeling in distributed environment: application to CORBA objects / Zakia Marrakchi [and others] -- The 1998 Lincoln Laboratory IDS evaluation / John McHugh -- Analysis and results of the 1999 DARPA off-line intrusion detection evaluation / Richard Lippmann [and others] -- Using rule-based activity descriptions to evaluate intrusion-detection systems / Dominique Alessandri -- LAMBDA: a language to model a database for detection of attacks / Frederic Cuppens and Rodolphe Ortalo -- Target naming and service apoptosis / James Riordan and Dominique Alessandri.".
- catalog extent "x, 225 p. :".
- catalog identifier "3540410856 (softcover : alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 1907".
- catalog issued "2000".
- catalog issued "2000.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.8 21".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security Congresses.".
- catalog subject "Computers Access control Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Information Systems.".
- catalog subject "Intrusion detection systems (Computer security) Congresses.".
- catalog subject "Operating systems (Computers).".
- catalog subject "QA76.9.A25 R34 2000".
- catalog tableOfContents "Using finite automata to mine execution data for intrusion detection / Christoph Michael and Anup Ghosh -- Adaptive, model-based monitoring for cyber attack detection / Alfonso Valdes and Keith Skinner -- A real-time intrusion detection system based on learning program behavior / Anup K. Ghosh, Christoph Michael, and Michael Schatz -- Intrusion detection using variable-length audit trail patterns / Andreas Wespi, Marc Dacier, and Herve Debar -- Flexible intrusion detection using variable-length behavior modeling in distributed environment: application to CORBA objects / Zakia Marrakchi [and others] -- The 1998 Lincoln Laboratory IDS evaluation / John McHugh -- Analysis and results of the 1999 DARPA off-line intrusion detection evaluation / Richard Lippmann [and others] -- Using rule-based activity descriptions to evaluate intrusion-detection systems / Dominique Alessandri -- LAMBDA: a language to model a database for detection of attacks / Frederic Cuppens and Rodolphe Ortalo -- Target naming and service apoptosis / James Riordan and Dominique Alessandri.".
- catalog title "Recent advances in intrusion detection : third international workshop, RAID 2000, Toulouse, France, October 2-4, 2000 : proceedings / Hervé Debar, Ludovic Mé, S. Felix Wu (eds.).".
- catalog type "Conference proceedings. fast".
- catalog type "Kongress. swd".
- catalog type "Toulouse (2000) swd".
- catalog type "text".