Guo, Zhi; Lam, Kwok-Yan; Chung, Siu-Leung; Gu, Ming; Sun, Jia-Guang Efficient presentation of multivariate audit data for intrusion detection of web-based internet services. (English) Zbl 1131.68445 Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 63-75 (2003). MSC: 68P25 PDFBibTeX XMLCite \textit{Z. Guo} et al., Lect. Notes Comput. Sci. 2846, 63--75 (2003; Zbl 1131.68445) Full Text: DOI
Yung, Kwong H. Using feedback to improve masquerade detection. (English) Zbl 1131.68355 Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 48-62 (2003). MSC: 68M99 68P99 62P99 PDFBibTeX XMLCite \textit{K. H. Yung}, Lect. Notes Comput. Sci. 2846, 48--62 (2003; Zbl 1131.68355) Full Text: DOI
Petrovskij, M. I. Outlier detection algorithms in data mining systems. (English. Russian original) Zbl 1074.68562 Program. Comput. Softw. 29, No. 4, 228-237 (2003); translation from Programmirovanie 29, No. 4, 66-80 (2003). MSC: 68P15 PDFBibTeX XMLCite \textit{M. I. Petrovskij}, Program. Comput. Softw. 29, No. 4, 228--237 (2003; Zbl 1074.68562); translation from Programmirovanie 29, No. 4, 66--80 (2003) Full Text: DOI
Reynolds, J.; Just, J.; Lawson, E.; Clough, L.; Maglich, R. On-line intrusion protection by detecting attacks with diversity. (English) Zbl 1090.68521 Gudes, Ehud (ed.) et al., Research directions in data and applications security. IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28–31, 2002, Cambridge, UK. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7541-3/hbk). IFIP, International Federation for Information Processing 128, 245-256 (2003). MSC: 68M10 PDFBibTeX XMLCite \textit{J. Reynolds} et al., IFIP, Int. Fed. Inf. Process. 128, 245--256 (2003; Zbl 1090.68521)
Belokosztolszki, András; Eyers, David Shielding RBAC infrastructures from cyberterrorism. (English) Zbl 1089.68505 Gudes, Ehud (ed.) et al., Research directions in data and applications security. IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28–31, 2002, Cambridge, UK. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7541-3/hbk). IFIP, International Federation for Information Processing 128, 3-14 (2003). MSC: 68M10 PDFBibTeX XMLCite \textit{A. Belokosztolszki} and \textit{D. Eyers}, IFIP, Int. Fed. Inf. Process. 128, 3--14 (2003; Zbl 1089.68505)
Dass, Mayukh; Cannady, James; Potter, Walter D. A blackboard-based learning intrusion detection system: A new approach. (English) Zbl 1039.68858 Chung, Paul W. H. (ed.) et al., Developments in applied artificial intelligence. 16th international conference on industrial and engineering applications of artificial intelligence and expert systems, IEA/AIE 2003, Loughborough, UK, June 23–26, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40455-4/pbk). Lect. Notes Comput. Sci. 2718, 385-390 (2003). MSC: 68U99 68M10 68T35 68T05 PDFBibTeX XMLCite \textit{M. Dass} et al., Lect. Notes Comput. Sci. 2718, 385--390 (2003; Zbl 1039.68858) Full Text: Link
Li, Jun; Reiher, Peter; Popek, Gerald J. Disseminating security updates at internet scale. (English) Zbl 1041.68004 Advances in Information Security 8. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7305-4/hbk). x, 157 p. (2003). MSC: 68M10 68-01 PDFBibTeX XMLCite \textit{J. Li} et al., Disseminating security updates at internet scale. Boston, MA: Kluwer Academic Publishers (2003; Zbl 1041.68004)
Rao, Xian; Dong, Cun-xi; Yang, Shao-quan Statistic learning and intrusion detection. (English) Zbl 1026.68587 Wang, Guoyin (ed.) et al., Rough sets, fuzzy sets, data mining, and granular computing. 9th international conference, RSFDGrC 2003, Chongqing, China, May 26-29, 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2639, 652-659 (2003). MSC: 68T05 PDFBibTeX XMLCite \textit{X. Rao} et al., Lect. Notes Comput. Sci. 2639, 652--659 (2003; Zbl 1026.68587) Full Text: Link
Jin, Hai; Sun, Jianhua; Chen, Hao; Han, Zongfen A risk-sensitive intrusion detection model. (English) Zbl 1028.68521 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 107-117 (2003). MSC: 68P25 PDFBibTeX XMLCite \textit{H. Jin} et al., Lect. Notes Comput. Sci. 2587, 107--117 (2003; Zbl 1028.68521) Full Text: Link
Yeung, Dit-Yan; Ding, Yuxin Host-based intrusion detection using dynamic and static behavioral models. (English) Zbl 1007.68952 Pattern Recognition 36, No. 1, 229-243 (2003). MSC: 68U99 68T10 PDFBibTeX XMLCite \textit{D.-Y. Yeung} and \textit{Y. Ding}, Pattern Recognition 36, No. 1, 229--243 (2003; Zbl 1007.68952) Full Text: DOI
Strobel, Stefan Firewalls and IT security. Foundations and practice of secure networks: IP filter, content security, PKI, intrusion detection and application security. 3., aktualisierte und erweiterte Aufl. (Firewalls und IT-Sicherheit. Grundlagen und Praxis sicherer Netze: IP-Filter, Content Security, PKI, Intrusion Detection und Applikationssicherheit.) (German) Zbl 1048.68016 Heidelberg: dpunkt (ISBN 3-89864-152-X/pbk). xvi, 300 S. (2003). Reviewer: Lenka Fibikova (Sauerlach) MSC: 68M10 68-01 68M12 PDFBibTeX XMLCite \textit{S. Strobel}, Firewalls und IT-Sicherheit. Grundlagen und Praxis sicherer Netze: IP-Filter, Content Security, PKI, Intrusion Detection und Applikationssicherheit. 3., aktualisierte und erweiterte Aufl. Heidelberg: dpunkt (2003; Zbl 1048.68016)
Pieprzyk, Josef; Hardjono, Thomas; Seberry, Jennifer Fundamentals of computer security. (English) Zbl 1011.68034 Berlin: Springer. xx, 677 p. EUR 64.95/net; sFr. 108.00; £45.50; $ 69.95 (2003). Reviewer: Lenka Fibikova (Essen) MSC: 68P25 68-01 PDFBibTeX XMLCite \textit{J. Pieprzyk} et al., Fundamentals of computer security. Berlin: Springer (2003; Zbl 1011.68034)