27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Brian Jewell and Justin Beaver<br />

Kosoresow, A.P. and Hofmeyr, S.A. (1997) Intrusion detection via system call traces. IEEE Software, 14(5):35–<br />

42.<br />

Kymie, M.C.T and Maxion, R. (2002) “”Why 6?’ Defining the Operational Limits of stide, an Anomaly-Based<br />

Intrusion Detector."<br />

Lee, W. et al. (1997) Learning patterns from UNIX process execution traces for intrusion detection. In AAAI<br />

Workshop on AI Approaches to Fraud Detection and Risk Management, pages 50–56. AAAI Press.<br />

Lee, W. and Stolfo, S.J. (1998) Data mining approaches for intrusion detection. In Proceedings of the 7th<br />

USENIX Security Symposium.<br />

(Liao 2002) Y. Liao and V. R. Vemuri. Use of k-nearest neighbor classifier for intrusion detection. Computers &<br />

Security, 21(5):439–448, 2002.<br />

Liu, Y. et al. (2009) “SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack.” In<br />

Proceedings of the 42nd Hawaii International <strong>Conference</strong> on System Sciences, 2009.<br />

McAfee (2003), [online], http://www.mcafee.com/us/.<br />

Richardson, R. (2007) CSI Computer Crime and Security Survey, [online],<br />

http://icmpnet.com/v2.gocsi.com/pdf/CSISurvey2007.pdf.<br />

Sans Institute. (2010) “20 Critical Security Controls, Critical Control 15: Data Loss Prevention.” [online],<br />

http://www.sans.org/critical-security-controls/control.php?id=15<br />

Warrender, C. et al (1999) "Detecting Intrusions Using System Calls: Alternative Data Models." In 1999 IEEE<br />

Symposium on Security and Privacy.<br />

142

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!