Secunia Security Advisory - A vulnerability has been reported in Sun ONE Application Server and Sun Java System Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
ada8f891eadd3173ebefe93e7d04bdd006d28136a59aa4fc409943752958957f
Secunia Security Advisory - A vulnerability has been reported in Novell iManager, which can be exploited by malicious people to cause a DoS (Denial of Service).
2ab1468fa82da264f34951147106ef891c63cf883f2c1fdeb7967e4f15617065
Secunia Security Advisory - Debian has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).
086cd813c27a6853be93fd72a882ede84631d46a86d36210e6e1bc3a15d4eb7c
Secunia Security Advisory - A vulnerability has been reported in Novell eDirectory, which can be exploited by malicious people to cause a DoS (Denial of Service).
336f52f5129fcdb02dcef3dd20b9b24923658bfebfd85bbc1fbeb168c938f2a2
Secunia Security Advisory - Apple has acknowledged a vulnerability in GDB included in Xcode, which potentially can be exploited by malicious, local users to gain escalated privileges or malicious people to compromise a vulnerable system.
e0e81d07c2be1d10904eee64cd325a9d32717cea6a09a52b2faf1c82df95b6b3
Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
e70d2ba261b9f8cec8f215a9ea76c0b76c340b1c8b9ea7cbc8898b65a41f172e
Secunia Security Advisory - Max Gipehtykrop has discovered two vulnerabilities in BlooMooWeb's ActiveX control, which can be exploited by malicious people to compromise a user's system.
9109c3e8c9360d3c722b00662e684b4fb7b35e2170029bbfd0055f035a751ce4
A comparative study of anomaly detection schemes in network intrusion detection.
b9928e0c57d7fdc9212d412d47a979bfa6ae04da6fed4884e9c6313b71e3f0c1
A Data Mining Framework for Building Intrusion Detection Models.
60d04b31fcfe448027bbb5860b8344475e331292a2f38a9c58a5f6bf8565794d
A Framework For An Adaptive Intrusion Detection System with Data Mining.
8f6eb99f5161f3bdc97f1b2abc1790661385fcd2a732370cb3a64ad0d76ff3b4
A Framework for Classifying Denial of Service Attacks.
6bb2ae1d0f82b729c5207119d92f40b2d239e203a10af9bec1f54258ede9691e
A Framework for Constructing Features and Models for Intrusion Detection Systems.
f61527cf4af2510db8ad35437d3eb26e96999237907e12a510de0e49b2733a31
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data.
0449a5f802f6d128eb3b915c406f89489a0cd361eccb64aa70000c137ec98639
A Learning Based Approach to the Detection of SQL Attacks.
fb14d0903dcb142210d09d168d0e7272d143fb9ec59f4aea8414793dabf2f3d3
A Multimodel Approach to the Detection of Web-based Attacks.
9117f01a49f372f1077722bd13c30ab099dadef91785ce47ff698440299999b1
ADAM: Detecting Intrusions by Data Mining.
365871b2726492c541c1128a5b7aa28e3b8f49a1efca1a45ea31c32a99328740
Adaptive ModelBased Monitoring and Threat Detection.
ffb2ace3c126a841b0995e6762b65668e80fa180369921ba297bf8a07215995c
Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic.
172077357cd30fcc62e04169f1ec84f6a94d98bf29814df319b1c50ade80699a
An Analysis of 1999 DARPA for Network Anomaly Detection.
d4666f6ffd4ce7a95bacc505648efa236a6525bb48d04ed5b62be09a89deaf2b
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.
b8315ea07cf451e421585c010d3d279254f025a76e8535e1570373c64d43931c
Artificial Neural Networks for Misuse Detection.
453df9e792073f3916624b46fe6e9046520fa730ae9f4f767c0dd6fc2b1dbba3
Anomalous Payloadbased Network Intrusion Detection.
9c25b1fec06554bffaf334517971c4cb2970439182656787fe2c7be234ba7537
Anomalous Payloadbased Worm Detection and Signature Generation.
1a316e80a29f60a55607e500d38fbace3e0c8aa7b2006af81a622cbbe5f4d5c0
Anomaly Detection of Webbased Attacks.
c369809658f5a0f07f13ac5ff735d08a77fc9ec3cf8423f28b77e5130f59be51
Application of Artiticial Neural Network to Misuse Detection: Initial Results.
ad265ece6bdbe90f06722c37a8c536e35747fae08fb3245b7017a1639611694e