[243] in Intrusion Detection Systems
Some more refs
daemon@ATHENA.MIT.EDU (Jim Truitt)
Wed May 24 14:33:03 1995
Date: Wed, 24 May 1995 23:00:26 +1000
To: ids@uow.edu.au
From: jtruitt@iu.net (Jim Truitt)
Reply-To: ids@uow.edu.au
Courtesy of SAIC's security documents archive.
URL: http://mls.saic.com/docs.html
Intrusion Detection
A Software Architecture to support Misuse Intrusion Detection
(March 1995, 250K)
An Application of Pattern Matching in Intrusion Detection
(June 1994, 674K)
Algorithm for Distrubuted Recognition and Accountability
(Undated, 209K)
A Pattern Matching Model for Misuse Intrusion Detection
(Undated, 191K)
AI Approach to Intrusion Detection
(June 1994, 168K)
Intrusion Detection In Computers
(January 1991, 12K text)
USTAT - A Real-time Intrusion Detection System for UNIX
(November 1992, 1.3M)