Exploiting Independent State For Network Intrusion Detection
Title | Exploiting Independent State For Network Intrusion Detection |
Publication Type | Conference Paper |
Year of Publication | 2005 |
Authors | Sommer, R., & Paxson V. |
Published in | Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005) |
Page(s) | 59-71 |
Other Numbers | 1850 |
Acknowledgment | This work was partially supported by funding provided to ICSI through National Science Foundation grant OCI: 0334088 (Viable Network Defense for Scientific Research Institutions). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation. |
URL | http://www.icsi.berkeley.edu/pubs/networking/state-acsac05.pdf |
Bibliographic Notes | Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), Tucson, Arizona, pp. 59-71 |
Abbreviated Authors | R. Sommer and V. Paxson |
ICSI Research Group | Networking and Security |
ICSI Publication Type | Article in conference proceedings |