000 03505nam a22006495i 4500
001 978-3-540-45248-5
003 DE-He213
005 20240423132505.0
007 cr nn 008mamaa
008 121227s2003 gw | s |||| 0|eng d
020 _a9783540452485
_9978-3-540-45248-5
024 7 _a10.1007/b13476
_2doi
050 4 _aQA76.9.M3
072 7 _aKJQ
_2bicssc
072 7 _aCOM039000
_2bisacsh
072 7 _aKJQ
_2thema
082 0 4 _a004.068
_223
245 1 0 _aRecent Advances in Intrusion Detection
_h[electronic resource] :
_b6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings /
_cedited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel.
250 _a1st ed. 2003.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2003.
300 _aX, 242 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2820
505 0 _aNetwork Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
650 0 _aElectronic data processing
_xManagement.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks .
650 0 _aComputer science.
650 0 _aOperating systems (Computers).
650 0 _aComputers and civilization.
650 1 4 _aIT Operations.
650 2 4 _aCryptology.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputer Science.
650 2 4 _aOperating Systems.
650 2 4 _aComputers and Society.
700 1 _aVigna, Giovanni.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aJonsson, Erland.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKruegel, Christopher.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540408789
776 0 8 _iPrinted edition:
_z9783662188538
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2820
856 4 0 _uhttps://doi.org/10.1007/b13476
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188326
_d188326