Fraud Detection: Using Data Analysis Techniques to Detect Fraud, Global Audit Publications Canada, 1999. ,
Penetration state transition analysis: A rule-based intrusion detection approach, [1992] Proceedings Eighth Annual Computer Security Application Conference, 1992. ,
DOI : 10.1109/CSAC.1992.228217
ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection, Kluwer, pp.353-368, 2001. ,
DOI : 10.1007/0-306-46998-7_25
LAMBDA: A Language to Model a Database for Detection of Attacks, RAID, pp.197-216, 2000. ,
DOI : 10.1007/3-540-39945-3_13
From Declarative Signatures to Misuse IDS, RAID, LNCS, pp.1-21, 2001. ,
DOI : 10.1007/3-540-45474-8_1
A Model for the Semantics of Attack Signatures in Misuse Detection Systems, 7th Information Security Conference, pp.158-169, 2004. ,
DOI : 10.1007/978-3-540-30144-8_14
USTAT: a real-time intrusion detection system for UNIX, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, p.16, 1993. ,
DOI : 10.1109/RISP.1993.287646
NetSTAT: a network-based intrusion detection approach, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), p.25, 1998. ,
DOI : 10.1109/CSAC.1998.738566
EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, National Information Systems Security Conference, pp.353-365, 1997. ,
Modeling multistep cyber attacks for scenario recognition, Proceedings DARPA Information Survivability Conference and Exposition, pp.284-292, 2003. ,
DOI : 10.1109/DISCEX.2003.1194892
Cards: A Distributed System for Detecting Coordinated Attacks, IFIP TC11 16th Annual Working Conference on Information Security, pp.171-180, 2000. ,
DOI : 10.1007/978-0-387-35515-3_18
STATL: An attack language for state-based intrusion detection, Journal of Computer Security, vol.10, issue.1-2, 2000. ,
DOI : 10.3233/JCS-2002-101-204
Improving the Efficiency of Misuse Detection, DIMVA. LNCS, pp.188-205, 2005. ,
DOI : 10.1007/11506881_12
Simplifying Signature Engineering by Reuse, Emerging Trends in Information and Communication Security, pp.436-450, 2006. ,
DOI : 10.1007/11766155_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.8689
Automated recognition of event scenarios for digital forensics, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.293-300, 2006. ,
DOI : 10.1145/1141277.1141346
Privacy-Respecting Intrusion Detection, In: Advances in Information Security, vol.35, p.307, 2007. ,
A Meta-Model for the Definition of the Semantics of Complex Events in Active Database Management Systems, 1998. ,