Sciweavers

8177 search results - page 191 / 1636
» Detecting System Emulators
Sort
View
IAW
2003
IEEE
15 years 7 months ago
Detecting Insider Threats by Monitoring System Call Activity
Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenni...
102
Voted
NDSS
2002
IEEE
15 years 7 months ago
BlueBox: A Policy-Driven, Host-Based Intrusion Detection System
Suresh Chari, Pau-Chen Cheng
WETICE
2002
IEEE
15 years 7 months ago
Intrusion Detection: Systems and Models
Joseph S. Sherif, Tommy G. Dearmond