Sciweavers

120
Voted
SP
1991
IEEE
15 years 7 months ago
A Pattern-Oriented Intrusion-Detection Model and Its Applications
Shiuh-Pyng Shieh, Virgil D. Gligor
106
Voted
SP
1991
IEEE
15 years 7 months ago
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels
Phillip A. Porras, Richard A. Kemmerer
163
Voted
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 7 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
134
Voted
SP
1991
IEEE
15 years 7 months ago
A Novel Decomposition of Multilevel Relations into Single-Level Relations
In this paper we give a new decomposition algorithm that breaks a multilevel relation into single-level relations and a new recovery algorithmwhich reconstructs the original multi...
Sushil Jajodia, Ravi S. Sandhu
103
Voted
SP
1991
IEEE
15 years 7 months ago
Safety Analysis for the Extended Schematic Protection Model
Paul Ammann, Ravi S. Sandhu