[책][B] Non-functional requirements in software engineering

L Chung, BA Nixon, E Yu, J Mylopoulos - 2012 - books.google.com
Non-Functional Requirements in Software Engineering presents a systematic and pragmatic
approach tobuilding quality into'software systems. Systems must exhibit software quality …

Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation

RP Lippmann, DJ Fried, I Graf… - Proceedings DARPA …, 2000 - ieeexplore.ieee.org
An intrusion detection evaluation test bed was developed which generated normal traffic
similar to that on a government site containing 100's of users on 1000's of hosts. More than …

Self-efficacy in information security: Its influence on end users' information security practice behavior

HS Rhee, C Kim, YU Ryu - Computers & security, 2009 - Elsevier
The ultimate success of information security depends on appropriate information security
practice behaviors by the end users. Based on social cognitive theory, this study models and …

A database of computer attacks for the evaluation of intrusion detection systems

KKR Kendall - 1999 - dspace.mit.edu
The 1998 DARPA intrusion detection evaluation created the first standard corpus for
evaluating computer intrusion detection systems. This corpus was designed to evaluate both …

[PDF][PDF] A markov chain model of temporal behavior for anomaly detection

N Ye - Proceedings of the 2000 IEEE Systems, Man, and …, 2000 - Citeseer
This paper presents an anomaly detection technique to detect intrusions into computer and
network systems. In this technique, a Markov chain model is used to represent a temporal …

Improving intrusion detection performance using keyword selection and neural networks

RP Lippmann, RK Cunningham - Computer networks, 2000 - Elsevier
The most common computer intrusion detection systems detect signatures of known attacks
by searching for attack-specific keywords in network traffic. Many of these systems suffer …

Critical analysis of different approaches to minimizing user‐related faults in information systems security: implications for research and practice

MT Siponen - Information Management & Computer Security, 2000 - emerald.com
Even though the human component has been recognized to have a crucial role in
information systems (IS) security, the human issues have not received much attention …

Internet security: malicious e‐mails detection and protection

S Dong‐Her, C Hsiu‐Sen, C Chun‐Yuan… - Industrial Management & …, 2004 - emerald.com
New malicious e‐mails are created at the rate of thousands a year and pose a serious
security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail …

Corporate system security: towards an integrated management approach

H Ngo Higgins - Information Management & Computer Security, 1999 - emerald.com
This paper discusses an integrated security approach that engages multiple functional
levels in an organization from the Board and management to IT staff and individual users …

Modeling intrusion detection system by discovering association rule in rough set theory framework

W Xuren, H Famei, X Rongsheng - … International Conference on …, 2006 - ieeexplore.ieee.org
In Intrusion Detection Systems, many intelligent information processing methods, data
miming technology and so on have been applied to generating attack signatures …