White et al., A peer-based hardware protocol for intrusion detection systems, Military Communications Conference, 1996, MILCOM ′96, Conference Proceedings, IEEE, vol. 2, Oct. 21-24, 1996, pp. 468-472, vol. 2.* |
Ragsdale et al., Adaptation techniques for intrusion detection and intrusioin response systems, Systems, Man and Cybernetics, 2000 IEEE International Conference on, vol. 4, Oct. 8-11, 2000, pp. 2344-2349, vol. 4.* |
Okazaki et al., A new intrusion detection method based on process profiling, Applications and the Internet, 2002 (SAINT 2002), Proceedings, 2002, Symposium on, Jan. 28-Feb. 1, 2002, pp. 82-90.* |
“Detecting Intrusions Using System Calls: Alternative Data Models” Christina Warrender et al., 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society pp. 133-145. |
“Intrusion Detecting Using Sequences of System Calls”, Steven A. Hofmeyr et al., Department of Computer Science, University of New Mexico, pp. 1-34, and Revisions Made to the Paper (7) pages, Dec. 17, 1997. |
“Intrusion Detection Using Sequences of System Calls”, Steven A. Hofmeyr et al., Department of Computer Science, University of New Mexico, pp. 1-25, Aug. 18, 1998. |
“Hardening COTS Software with Generic Software Wrappers” Timothy Fraser et al., 1999 IEEE Symposium on Security and Privacy, (15) pages. |
“Distance Between Strings”, www.cut-the-knot.com/do_you_know/Strings.html, pp. 1-2, printed Feb. 29, 2000. |
“Alignments, the Basis for Sequence Comparison”http://rrna.uia.ac.be/˜peter/doctoraat/ali.html, pp. 1-7, printed Mar. 22, 2000. |
D. Kilpatrick and L. Badger, “Sequence-Based Intrusion Detection Using Generic Software Wrappers,” 1999 IEEE Symposium on Security and Privacy, May 9-12, 1999 (with abstract and program schedule). |