Recent Advances in Intrusion Detection [electronic resource] : Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings /

Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.

Saved in:
Bibliographic Details
Main Authors: Debar, Hervé. editor., Mé, Ludovic. editor., Wu, S. Felix. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000
Subjects:Computer science., Computer communication systems., Operating systems (Computers)., Computer security., Data encryption (Computer science)., Computers and civilization., Management information systems., Computer Science., Computer Communication Networks., Systems and Data Security., Data Encryption., Management of Computing and Information Systems., Computers and Society., Operating Systems.,
Online Access:http://dx.doi.org/10.1007/3-540-39945-3
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:210635
record_format koha
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Computer Communication Networks.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Computers and Society.
Operating Systems.
Computer science.
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Computer Communication Networks.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Computers and Society.
Operating Systems.
spellingShingle Computer science.
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Computer Communication Networks.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Computers and Society.
Operating Systems.
Computer science.
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Computer Communication Networks.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Computers and Society.
Operating Systems.
Debar, Hervé. editor.
Mé, Ludovic. editor.
Wu, S. Felix. editor.
SpringerLink (Online service)
Recent Advances in Intrusion Detection [electronic resource] : Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings /
description Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.
format Texto
topic_facet Computer science.
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Computers and civilization.
Management information systems.
Computer Science.
Computer Communication Networks.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Computers and Society.
Operating Systems.
author Debar, Hervé. editor.
Mé, Ludovic. editor.
Wu, S. Felix. editor.
SpringerLink (Online service)
author_facet Debar, Hervé. editor.
Mé, Ludovic. editor.
Wu, S. Felix. editor.
SpringerLink (Online service)
author_sort Debar, Hervé. editor.
title Recent Advances in Intrusion Detection [electronic resource] : Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings /
title_short Recent Advances in Intrusion Detection [electronic resource] : Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings /
title_full Recent Advances in Intrusion Detection [electronic resource] : Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings /
title_fullStr Recent Advances in Intrusion Detection [electronic resource] : Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings /
title_full_unstemmed Recent Advances in Intrusion Detection [electronic resource] : Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings /
title_sort recent advances in intrusion detection [electronic resource] : third international workshop, raid 2000 toulouse, france, october 2–4, 2000 proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2000
url http://dx.doi.org/10.1007/3-540-39945-3
work_keys_str_mv AT debarherveeditor recentadvancesinintrusiondetectionelectronicresourcethirdinternationalworkshopraid2000toulousefranceoctober242000proceedings
AT meludoviceditor recentadvancesinintrusiondetectionelectronicresourcethirdinternationalworkshopraid2000toulousefranceoctober242000proceedings
AT wusfelixeditor recentadvancesinintrusiondetectionelectronicresourcethirdinternationalworkshopraid2000toulousefranceoctober242000proceedings
AT springerlinkonlineservice recentadvancesinintrusiondetectionelectronicresourcethirdinternationalworkshopraid2000toulousefranceoctober242000proceedings
_version_ 1756268822665363456
spelling KOHA-OAI-TEST:2106352018-07-30T23:43:04ZRecent Advances in Intrusion Detection [electronic resource] : Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings / Debar, Hervé. editor. Mé, Ludovic. editor. Wu, S. Felix. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2000.engSince 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.Logging -- Better Logging through Formality -- A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions -- Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection -- Data Mining -- A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions -- Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report -- Modeling Process Behavior -- Adaptive, Model-Based Monitoring for Cyber Attack Detection -- A Real-Time Intrusion Detection System Based on Learning Program Behavior -- Intrusion Detection Using Variable-Length Audit Trail Patterns -- Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects -- IDS Evaluation -- The 1998 Lincoln Laboratory IDS Evaluation -- Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation -- Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems -- Modeling -- LAMBDA: A Language to Model a Database for Detection of Attacks -- Target Naming and Service Apoptosis.Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.Computer science.Computer communication systems.Operating systems (Computers).Computer security.Data encryption (Computer science).Computers and civilization.Management information systems.Computer Science.Computer Communication Networks.Systems and Data Security.Data Encryption.Management of Computing and Information Systems.Computers and Society.Operating Systems.Springer eBookshttp://dx.doi.org/10.1007/3-540-39945-3URN:ISBN:9783540399452