Bibtex Database Part1

Justin Lister (ruf@osiris.cs.uow.edu.au)
Fri, 5 Aug 1994 16:21:06 +1000 (EST)

Here are my current bibtex files on: (They were created using bibview).
Intrusion Detection Systems
Computer Security (will be in folowing post as mailer limit of 40000bytes)
Computer Books          ""	 ""
Expert Systems          ""		""

Please email me any corrections, or additions for any of the files. Whenever
possible please ensure that additions are in bibtex format.

These files will be maintained for the ftp as well as the postscript papers
mentioned in the previous post, in addition to the ids archives, faq.

And eventually a www page will be available.

Now nobody can claim I wont be kept busy. B)
# Begin Intrusion Detection ---------------------------------------------

@STRING{SSP="Proceedings of the IEEE Symposium on Research in Security and Privacy"}
@STRING{ESP="Elsevier Science Publishers"}
@STRING{SRII="SRI International"}
@STRING{SRIAddress="333 Ravenswood Avenue, Menlo Park, CA 94025-3493"}
@STRING{SRIPhone="Tel: (415) 326-6200, Fax: 326-5512, Telex: 334486"}
@STRING{APP="Application"}
@STRING{EXP="Experimental"}
@STRING{MATH="Mathematical"}
@STRING{PRAC="Practical"}
@STRING{THEORY="Theoretical"}

@incollection{Abrams-Olson-RBTAC,
   author    = {Marshall D. Abrams and Ingrid M. Olson},
   title     = {{Rule-Based Trusted Access Control}},
   booktitle = {IT Security: The Need for International Cooperation},
   year      = {1992},
   editor    = {G.G Gable and W. J Caelli},
   publisher = ESP,
   pages     = {409-420},
   note      = {IFIP}
}


@techreport{NIDES-User_Manual,
   author    = {Debra Anderson and Chris Dodd and Fred Gilham and Caveh Jalali and Ann Tamaru and Mabry Tyson},
   title     = {{Next Generation Intrusion Detection Expert System (NIDES): User Manual for Security Officer User Interface (SOUI) Version 1 - Alpha Release}},
   institution = SRII,
   year      = {1993},
   month     = mar,
   address   = SRIAddress,
   number    = SRIPhone,
   type      = {User Manual}
}


@techreport{NIDES-SAFEGUARD,
   author    = {Debra Anderson and Teresa F. Lunt and Harold Javitz and Ann Tamaru and Alfonso Valdes},
   title     = {{SAFEGUARD FINAL REPORT: Detecting Unusual Program Behavior Using the NIDES Statistical Component}},
   institution = SRII,
   year      = {1993},
   month     = dec,
   address   = SRIAddress,
   number    = SRIPhone,
   type      = {SRI Project 2596}
}


@misc{Anderson-TMS,
   author    = {J P. Anderson},
   title     = {{Computer Security Threat Monitoring and Surveillance}},
   year      = {1980},
   month     = apr,
   howpublished = {James P. Anderson Co},
   note      = {Fort Washington PA}
}


@inproceedings{Bauer-Koblentz-NIDX,
   author    = {David S. Bauer and Michael E. Koblentz},
   title     = {{NIDX - An Expert System for Real-Time Network Intrusion Detection}},
   booktitle = SSP,
   organization = {IEEE},
   year      = {1988},
   month     = apr,
   pages     = {98-106},
   category  = prac,
   note      = {11-13th, Washington, DC}
}


@incollection{Brady-IB2S,
   author    = {Kevin Brady},
   title     = {{Integrating B2 Security Into a UNIX System}},
   booktitle = {IT Security: The Need for International Cooperation},
   year      = {1992},
   editor    = {G.G Gable and W. J Caelli},
   publisher = ESP,
   note      = {IFIP}
}


@inproceedings{Carrettoni-Castano-RETISS,
   author    = {F. Carrettoni and S. Castano and G. Martella and P. Samarati},
   title     = {{RETISS: A Real Time Security System For Threat Detection Using Fuzzy Logic}},
   booktitle = {Proceedings 25th Anuual IEEE International Carnahan Conference on Security Technology},
   year      = {1991},
   month     = oct,
   note      = {1-3rd, Taipei, Taiwan}
}


@inproceedings{Chalmers-ADCSPMPS,
   author    = {Leslie S. Chalmers},
   title     = {{An analysis of the differences between the computer security practices in the military and private sectors}},
   booktitle = SSP,
   year      = {1986},
   month     = apr,
   pages     = {71-4},
   note      = {7-9th, Oakland, California}
}


@inproceedings{Debar-Becker-NNCIDS,
   author    = {Herv\'e Debar and Monique Becker and Didier Siboni},
   title     = {{A Neural Network Component for an Intrusion Detection System}},
   booktitle = SSP,
   organization = {IEEE and IACR},
   year      = {1992},
   month     = may,
   pages     = {240-250},
   category  = prac,
   note      = {4-6th, Oakland, CA}
}


@inproceedings{Debar-Dorizzi-RNIDS,
   author    = {Herv\'e Debar and Bernadette Dorizzi},
   title     = {{An Application of a Recurrent Network to an Intrusion Detection System}},
   booktitle = {IJCNN International Joint Conference in Neural Networks},
   organization = {IEEE and Int'l Neural Network Society},
   year      = {1992},
   month     = jun,
   pages     = {478-483 vol 2},
   category  = {app, exp},
   note      = {7-11th, Baltimore, MD}
}


@inproceedings{Denning-IDM,
   author    = {Dorothy E. Denning},
   title     = {{An Intrusion-Detection Model}},
   booktitle = SSP,
   year      = {1986}
}


@inproceedings{Deswarte-Blain-Fabre-ITDCS,
   author    = {Yves Deswarte and Laurent Blain and Jean-Charles Fabre},
   title     = {{Intrusion Tolerance in Distributed Computer Systems}},
   booktitle = SSP,
   year      = {1991},
   month     = may,
   pages     = {110-21},
   note      = {20-22nd Oakland, CA}
}


@inproceedings{Deswarte-Fabre-Saturne,
   author    = {Yves Deswarte and Jean-Charles Fabre and Jean-Michel Fray and David Powell and Pierre-Guy Ran\'ea},
   title     = {{SATURNE: A distributed computing system which tolerates faults and intrusions}},
   booktitle = {Proceedings workshop on the future trends of distributed computer systems in the 1990's},
   year      = {1988},
   month     = sep,
   pages     = {329-38},
   note      = {14-16th Hong Kong}
}


@inproceedings{Downs-Rub-IDAC,
   author    = {Deborah D. Downs and Jerzy R. Rub and Kenneth C. Kung and Carole S. Jordan},
   title     = {{Issues In Discretionary Access Control}},
   booktitle = SSP,
   year      = {1985},
   month     = apr,
   pages     = {208-18},
   note      = {22-24th Oakland, California}
}


@misc{Frank-AIIDCFD,
   author    = {Jeremy Frank},
   title     = {{Artifical Intelligence and Intrusion Detection: Current and Future Directions}},
   year      = {1994},
   month     = jun,
   note      = {ftp distribution}
}


@inproceedings{Fray-IT,
   author    = {Jean-Michel Fray and Yves Deswarte and David Powell},
   title     = {{Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering}},
   booktitle = SSP,
   year      = {1986},
   pages     = {194-201}
}


@inproceedings{Lunt-Garvey-MBID,
   author    = {Thomas D. Garvey and Teresa F. Lunt},
   title     = {{Model-Based Intrusion Detection}},
   booktitle = {Proceedings of the Fourteenth National Computer Security Conference},
   year      = {1991},
   month     = oct
}


@inproceedings{Lunt-Garvey-UMI,
   author    = {Thomas D. Garvey and Teresa F. Lunt},
   title     = {{Using Models of Intrusions}},
   booktitle = {Third Workshop on Computer Security Incidence Handling},
   year      = {1991},
   month     = aug
}


@inproceedings{Gong-Qian-CCSI,
   author    = {Li Gong and Xiaolei Qian},
   title     = {{The Complexity and Composability of Secure Interoperation}},
   booktitle = SSP,
   year      = {1994},
   month     = may
}


@inproceedings{Heberlein-NSM,
   author    = {L. Todd Heberlein and Gihan V. Dias and Karl N. Levitt and Biswanath Mukherjee and Jeff Wood and David Wolber},
   title     = {{A Network Security Monitor}},
   booktitle = SSP,
   organization = {IEEE},
   year      = {1990},
   month     = may,
   pages     = {296-304},
   category  = prac,
   note      = {7-9th, Oakland, CA}
}


@inproceedings{Helman-Liepins-SFATA,
   author    = {Paul Helman and Gunar Liepins},
   title     = {{Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse}},
   booktitle = {IEEE Transactions on Software Engineering},
   year      = {1993},
   month     = sep,
   note      = {vol 19, no 9}
}


@inproceedings{Helman-Liepins-FID,
   author    = {Paul Helman and Gunar Liepins and Wynette Richards},
   title     = {{Foundations of Intrusion Detection}},
   booktitle = {Proceedings of Computer Security Foundations Workshop V},
   organization = {IEEE},
   year      = {1992},
   month     = jun,
   pages     = {114-120},
   category  = prac,
   note      = {16-18th, Franconic, NH}
}


@inproceedings{Hoffman-Davis-SPI,
   author    = {Lance J. Hoffman and Russell J. Davis},
   title     = {{Security Pipeline Interface (SPI)}},
   booktitle = {Proceedings 6th Annual Computer Security Applications Conference},
   year      = {1990},
   month     = dec,
   pages     = {349-55},
   note      = {3-7th Tucson, AZ}
}


@incollection{Holden-RBIDS,
   author    = {Don Holden},
   title     = {{A Rule-Based Intrusion Detection System}},
   booktitle = {IT Security: The Need for International Cooperation},
   year      = {1992},
   editor    = {G.G Gable and W. J Caelli},
   publisher = ESP,
   pages     = {433-440},
   note      = {IFIP}
}


@inproceedings{Ilgun-USTAT,
   author    = {Koral Ilgun},
   title     = {{USTAT: A Real-time Intrusion Detection System for UNIX}},
   booktitle = SSP,
   year      = {1993},
   month     = may,
   pages     = {16-28}
}


@mastersthesis{Thesis-Ilgun-USTAT,
   author    = {Koral Ilgun},
   title     = {{USTAT A Real-time Intrusion Detection System for UNIX}},
   year      = {1992},
   month     = nov,
   school    = {University of California Santa Barbara}
}


@techreport{NIDES-System_Design,
   author    = {R. Jagannathan and Teresa Lunt and Debra Anderson and Chris Dodd and Fred Gilham and Caveh Jalali and Hal Javitz and Peter Neumann and Ann Tamaru and Alfonso Valdes},
   title     = {{System Design Document: Next-Generation Intrusion Detection Expert Sytem (NIDES)}},
   institution = SRII,
   year      = {1993},
   month     = mar,
   address   = SRIAddress,
   number    = SRIPhone,
   type      = {System Design Document; A007, A008, A009, A011, A012, A014}
}


@techreport{NIDES-Spec,
   author    = {R. Jagannathan and Teresa Lunt and Fred Gilham and Ann Tamaru and Caveh Jalali and Peter Neumann and Debra Anderson and Thomas Garvey and John Lowrance},
   title     = {{Requirements Specification: Next-Generation Intrusion Detection Expert System (NIDES)}},
   institution = SRII,
   year      = {1992},
   month     = sep,
   address   = SRIAddress,
   number    = SRIPhone,
   type      = {Requirements Specifications A001, A002, A003, A004, A006}
}


@techreport{Javitz-Valdes-NSC,
   author    = {Harold S. Javitz and Alfonso Valdes},
   title     = {{The NIDES Statistical Component Description and Justification}},
   institution = SRII,
   year      = {1994},
   month     = mar,
   address   = SRIAddress,
   number    = SRIPhone,
   type      = {A010-Justification}
}


@inproceedings{Javitz-Valdes-SAD,
   author    = {Harold S. Javitz and Alfonso Valdes},
   title     = {{The SRI IDES Statistical Anomaly Detector}},
   booktitle = SSP,
   year      = {1991},
   month     = may
}


@techreport{NIDES-Justification,
   author    = {Harold S. Javitz and Alfonso Valdes},
   title     = {{The NIDES Statistical Component: Description and Justification}},
   institution = SRII,
   year      = {1994},
   month     = mar,
   address   = SRIAddress,
   number    = SRIPhone,
   type      = {A010-Justification}
}


@techreport{NIDES-Rationale,
   author    = {Harold S. Javitz and Alfonso Valdes and Teresa Lunt and Ann Tamaru and Mabry Tyson and John Lowrance},
   title     = {{Next Generation Intrusion Detection Expert System (NIDES) 1. Statistical Algorithms Rationale 2. Rationale for Proposed Resolver}},
   institution = SRII,
   year      = {1993},
   month     = mar,
   address   = SRIAddress,
   number    = SRIPhone,
   type      = {A016- Rationales}
}


@inproceedings{Ferrier-PTAT,
   author    = {Laurent Jolia-Ferrier},
   title     = {{Penetration Testing As An Audit Tool}},
   booktitle = {Fourth IFIP  International Conference on Computer Security},
   year      = {1986},
   month     = dec,
   pages     = {119-25},
   note      = {2-4th Monte Carlo, Monaco}
}


@inproceedings{Karger-LDPDTH,
   author    = {Paul A. Karger},
   title     = {{Limiting the Damage Potential of Discretionary Trojan Horses}},
   booktitle = SSP,
   year      = {1987},
   month     = apr,
   pages     = {32-7},
   note      = {27-29th Oakland, California}
}


@inproceedings{Kephart-White-MCVP,
   author    = {Jeffrey O. Kephart and Steve R. White},
   title     = {{Measuring and Modeling Computer Virus Prevalence}},
   booktitle = SSP,
   year      = {1993},
   month     = may,
   pages     = {2-15}
}


@article{Art-Kerr,
   author    = {Susan Kerr},
   title     = {{Using AI to Improve Security}},
   journal   = {DATAMATION},
   year      = {1990},
   month     = feb,
   pages     = {57-60}
}


@inproceedings{Lankewicz-Benard-NPRA,
   author    = {Linda Lankewicz and Mark Benard},
   title     = {{Real--Time Anomaly Detection Using A Nonparametric Pattern Recognition Approach}},
   booktitle = {Proceedings of Seventh Annual Computer Security Conference},
   year      = {1991},
   month     = dec,
   note      = {2-6th, San Antonio, TX}
}


@incollection{Liepins-Vaccaro-IDRV,
   author    = {G. E. Liepins and H. S. Vaccaro},
   title     = {{Intrusion Detection: Its Role and Validation}},
   booktitle = {Computers and Security},
   year      = {1992},
   publisher = {Elsevier Science Publishers Ltd},
   pages     = {347-355}
}


@article{Art-Lunt,
   author    = {Teresa F. Lunt},
   title     = {{A survey of intrusion detection techniques}},
   journal   = {Computers and Security},
   year      = {1993},
   volume    = {12},
   pages     = {405-418}
}


@inproceedings{Lunt-AATA,
   author    = {Teresa F. Lunt},
   title     = {{Automated Audit Trail Analysis and Intrusion Detection: A Survey}},
   booktitle = {Proceedings of the 11th National Computer Security Conference},
   year      = {1988},
   month     = oct
}


@inproceedings{Lunt-AISDI,
   author    = {Teresa F. Lunt},
   title     = {{IDES: An Intelligent System fo Detecting Intruders}},
   booktitle = {Proceedings of the Symposium Computer Security, Threat and Countermeasures},
   year      = {1990},
   month     = nov
}


@inproceedings{Lunt-DICS,
   author    = {Teresa F. Lunt},
   title     = {{Detecting Intruders in Computer Systems}},
   booktitle = {Proceedings of the Sixth Anual Symposium and Technical Displays on Physical and Electronic Security},
   year      = {1989}
}


@inproceedings{Lunt-RTID,
   author    = {Teresa F. Lunt},
   title     = {{Real-Time Intrusion Detection}},
   booktitle = {COMPCON Spring Proceedings},
   year      = {1989}
}


@inproceedings{Lunt-USTI,
   author    = {Teresa F. Lunt},
   title     = {{Using Statistics to Track Intruders}},
   booktitle = {Proceedings of the Joint Statistical Meetings of the American Statistical Association},
   year      = {1990},
   month     = aug
}


@inproceedings{Lunt-Jag-PRTIDES,
   author    = {Teresa F. Lunt and R. Jagannathan},
   title     = {{A Prototype Real-Time Intrusion-Detection Expert System}},
   booktitle = SSP,
   year      = {1988},
   month     = apr
}


@inproceedings{Lunt-Jag-KBID,
   author    = {Teresa F. Lunt and R. Jagannathan and Rosanna Lee and Alan Whitehurst},
   title     = {{Knowledge-Based Intrusion Detection}},
   booktitle = {Proceedings of the AI Systems in Government Conference},
   year      = {1989},
   month     = mar
}


@techreport{IDES-Final_Tech,
   author    = {Teresa F. Lunt and Ann Tamaru and Fred Gilham and R. Jagannathan and Caveh Jalali and Peter G. Neumann and Harold S. Javitz and Alfonso Valdes and Thomas D. Garvey},
   title     = {{A Real-Time Intrusion-Detection Expert System (IDES)}},
   institution = SRII,
   year      = {1992},
   month     = feb,
   address   = SRIAddress,
   number    = SRIPhone,
   type      = {Final Technical Report}
}


@inproceedings{IDES-Progress_Report,
   author    = {Teresa F. Lunt and Ann Tamaru and Fred Gilham and R. Jagannathan and Peter G. Neumann and Caveh Jalali},
   title     = {{IDES: A Progress Report}},
   booktitle = {Proceedings of the Sixth Annual Computer Security Applications Conference},
   year      = {1990},
   month     = sep
}


@inproceedings{McAuliffe-SCIDST,
   author    = {Noelle McAuliffe and Dawn Wolcott and Lorrayne Schaefer and Nancy Kelem and Brian Hubbard and Theresa Haley},
   title     = {{Is Your Computer Being Misused ? A Survey of Current Intrusion Detection System Technology}},
   booktitle = {Proceedings of the Sixth Annual Computer Security Applications Conference},
   year      = {1990},
   pages     = {260-272}
}


@phdthesis{Minos-Newberry,
   author    = {William Michael Newberry},
   title     = {{Active Intruder Detection: Some Aspects of Computer Security and User Authentication}},
   year      = {1991},
   month     = feb,
   school    = {Australian Defence Force Academy University College University of New South Wales}
}


@incollection{Obaidat-MICAS,
   author    = {M. S. Obaidat},
   title     = {{A methodology for improving computer access security}},
   booktitle = {Computers and Security},
   year      = {1993},
   publisher = {Elsevier Science Publishers Ltd},
   pages     = {657-662}
}


@inproceedings{Okamoto-PISS,
   author    = {Eiji Okamoto},
   title     = {{Proposal for Integrated Security Systems}},
   booktitle = {Proceedings 2nd International Conference on Systems Integration},
   year      = {1992},
   month     = jun,
   pages     = {354-8},
   note      = {15-18th Morristown, New Jersey}
}


@inproceedings{Petersen-IDA,
   author    = {Karen L. Petersen},
   title     = {{IDA - Intrusion Detection Alert}},
   booktitle = {Proceedings of the Sixtenth Annual International Computer Software and Applications Conference},
   organization = {IEEE},
   year      = {1992},
   month     = sep,
   pages     = {306-311},
   category  = prac,
   note      = {21-25th, Chicago, IL}
}


@article{Art-PfleegerTheofanos-MPT,
   author    = {Charles P. Pfleeger and Shari Lawrence Pfleeger and Mary Frances Theofanos},
   title     = {{A Methodology For Penetration Testing}},
   journal   = {Computers \& Security},
   year      = {1989},
   pages     = {613-20}
}


@inproceedings{Picciotto-EAS,
   author    = {J. Picciotto},
   title     = {{The Design of an Effective Auditing Subsystem}},
   booktitle = SSP,
   year      = {1987},
   month     = apr,
   pages     = {13-22}
}


@inproceedings{Porras-Kemmerer-PSTA,
   author    = {Phillip A. Porras and Richard A. Kemmerer},
   title     = {{Penetration State Transition Analysis A Rule-Based Intrusion Detection Approach}},
   booktitle = {Proceedings of the Eigth Annual Computer Security Applications Conference},
   organization = {Aerospace Computer Security Associates and IEEE and ACM SIGSAC},
   year      = {1992},
   month     = nov,
   pages     = {220-229},
   category  = prac,
   note      = {30-4th, San Antonio, TX}
}


@mastersthesis{Thesis-Porras-STAT,
   author    = {Phillip Andrew Porras},
   title     = {{STAT A State Transistion Analysis Tool For Intrusion Detection}},
   year      = {1992},
   school    = {University of California Santa Barbara}
}


@inproceedings{Qian-ICFIC,
   author    = {Xiaolei Qian},
   title     = {{Inference Channel--Free Integrity Constraints In Multilevel Relational Databases}},
   booktitle = SSP,
   year      = {1994},
   month     = may
}


@inproceedings{Schaen-McKenney-NA,
   author    = {Samuel I. Schaen and Brian W. McKenny},
   title     = {{Network Auditing: Issues and Recommendations}},
   booktitle = {Proceedings 7th Annual Computer Security Applications Conference},
   year      = {1991},
   month     = dec,
   pages     = {66-79},
   note      = {2-6th San Antonio, TX}
}


@inproceedings{Sebring-Shellhouse-ESIDCS,
   author    = {Michael M. Sebring and Eric Shellhouse and Mary E. Hanna},
   title     = {{Expert Systems In Intrusion Detection: A Case Study}},
   booktitle = {Proceedings of the 11th National Computer Security Conference},
   year      = {1988},
   month     = oct,
   pages     = {74-81}
}


@inproceedings{Seiden-Melanson-AFVSK,
   author    = {Kenneth F. Seiden and Jeffrey P. Melanson},
   title     = {{The Auditing Facility for a VMM Security Kernel}},
   booktitle = SSP,
   year      = {1990},
   month     = may
}


@inproceedings{Shieh-Gligor-ACSC,
   author    = {Shiuh-Pyng W. Shieh and Virgil D. Gligor},
   title     = {{Auditing the Use of Covert Storage Channels in Secure Systems}},
   booktitle = SSP,
   year      = {1990},
   month     = may,
   pages     = {285-95},
   note      = {7-9th, Oakland, California}
}


@inproceedings{Shieh-Gligor-POIDM,
   author    = {Shiuhpyng W. Shieh and Virgil D. Gligor},
   title     = {{A Pattern-Oriented Intrusion-Detection Model and Its Applications}},
   booktitle = SSP,
   organization = {IEEE and IACR},
   year      = {1991},
   month     = may,
   pages     = {327-342},
   category  = {prac, theory, math},
   note      = {20-22nd, Oakland, CA}
}


@inproceedings{Smaha-Haystack,
   author    = {Stephen E. Smaha},
   title     = {{Haystack: An Intrusion Detection System}},
   booktitle = {Proceedings of the Fourth Aerospace Computer Security Applications Conference},
   organization = {IEEE and ASIS},
   year      = {1988},
   month     = dec,
   pages     = {37-44},
   category  = prac,
   note      = {12-16th, Orlando, FL}
}


@inproceedings{Snapp-DIDS,
   author    = {Steven Snapp and James Brentano and Gihan V. Dias and Terrance L. Goan and Tim Grance and L. Todd Heberlein and Che-Lin Ho and Karl N. Levitt and Biswanath Mukherjee and Douglass L. Mansur and Kenneth L. Pon and Stephen E. Smaha},
   title     = {{A System for Distributed Intrusion Detection}},
   booktitle = {COMPCON Spring Proceedings},
   organization = {IEEE},
   year      = {1991},
   month     = feb,
   pages     = {170-176},
   category  = prac,
   note      = {25-1st, San Francisco, CA}
}


@inproceedings{Sprirakis-SN,
   author    = {Paul Sprirakis and Sokratis Katsikas and Dimitris Gritzalis and Francois Allegre and Dimitris Androutsopouls and John Darzentas and Claude Gigante and Dimitris Karagiannis and Heikki Putkonen and Thomas Spyrou},
   title     = {{SecureNet: A Network-Oriented Intelligent Intrusion Prevention And Detection System}},
   booktitle = {IFIP Security 94},
   year      = {1994},
   pages     = {2-16}
}


@inproceedings{Stickel-EICOU,
   author    = {Mark E. Stickel},
   title     = {{Elimination of Inference Channels by Optimal Upgrading}},
   booktitle = SSP,
   year      = {1994},
   month     = may
}


@article{Stoll-STWHU,
   author    = {Cliff Stoll},
   title     = {{Stalking the Wily Hacker - An Update}},
   journal   = {Communications of ACM},
   year      = {1993},
   month     = jun
}


@incollection{Tener-DISC,
   author    = {William T. Tener},
   title     = {{Discovery: An Expert System in the Commercial Data Security Environment}},
   booktitle = {Security and Protection in Information Systems},
   year      = {1989},
   editor    = {A. Grissonnanche},
   publisher = ESP,
   pages     = {261-268},
   note      = {IFIP}
}


@inproceedings{Teng-Chen-ADIGSP,
   author    = {Henry S. Teng and Kaihu Chen and Stephen C-Y Lu},
   title     = {{Adaptive Real--Time Anomaly Detection Using Inductively Generated Sequential Patterns}},
   booktitle = SSP,
   year      = {1990},
   month     = may
}


@misc{Teng-Chen-Lu-SATA,
   author    = {Henry S. Teng and Kaihu Chen and Stephen C-Y Lu},
   title     = {{Security Audit Trail Analysis Using Inductively Generated Predictive Rules}},
   year      = {1990}
}


@inproceedings{Liepins-Vaccaro-DACSA,
   author    = {H. S. Vaccaro and G. E. Liepins},
   title     = {{Detection of Anomalous Computer Session Activity}},
   booktitle = SSP,
   year      = {1989},
   pages     = {280-289}
}


@inproceedings{Wade-DS,
   author    = {Patricia W. Wade},
   title     = {{Data Security - Can auditor involvement or use of auditing techniques help in building more secure systems ?}},
   booktitle = {Proceedings of the Communications on the Move Conference},
   organization = {ICCS, ISITA, IEEE},
   year      = {1992},
   month     = nov,
   note      = {6-20th, Singapore}
}


@inproceedings{Winkler-Page-ISOA,
   author    = {J R. Winkler and W J. Page},
   title     = {{Intrusion and Anomaly Detection in Trusted Systems}},
   booktitle = {Proceedings of the Fifth Annual Computer Security Applications Conference},
   year      = {1989},
   month     = dec,
   pages     = {39-45}
}

# End Intrusion Detection -----------------------------------------------

-- 
+---------------------+--------------------------------------------------+
|  ____       ___     | Justin Lister                 ruf@cs.uow.edu.au  |
| |    \\   /\ __\    |     Center for Computer Security Research        |
| | |) / \_/ / |_     | Dept. Computer Science      voice: 61-42-214-330 |
| |  _ \\   /| _/     | University of Wollongong      fax: 61-42-214-329 |
| |_/ \/ \_/ |_| (tm) |     Computer Security a utopian dream...         |
|                     |  LiNuX - the only justification for using iNTeL  |
+---------------------+--------------------------------------------------+