Is your computer being misused? A survey of current intrusion detection system technology. McAuliffe, J. N., Wolcott, D., Schaefer, L. J., Kelem, N. L., Hubbard, B., & Haley, T. K. In ACSAC, pages 260-272, 1990. IEEE. Link Paper bibtex @inproceedings{conf/acsac/McAuliffeWSKHH90,
added-at = {2016-02-03T00:00:00.000+0100},
author = {McAuliffe, J. Noelle and Wolcott, Dawn and Schaefer, Lorrayne J. and Kelem, Nancy L. and Hubbard, Brian and Haley, Theresa K.},
biburl = {http://www.bibsonomy.org/bibtex/240cdda0387aef2b5d9203807df611353/dblp},
booktitle = {ACSAC},
crossref = {conf/acsac/1990},
ee = {http://dx.doi.org/10.1109/CSAC.1990.143785},
interhash = {9d429a9602fcd3a22427254b3898172a},
intrahash = {40cdda0387aef2b5d9203807df611353},
keywords = {dblp},
pages = {260-272},
publisher = {IEEE},
timestamp = {2016-02-04T11:39:49.000+0100},
title = {Is your computer being misused? A survey of current intrusion detection system technology.},
url = {http://dblp.uni-trier.de/db/conf/acsac/acsac1990.html#McAuliffeWSKHH90},
year = 1990
}
Downloads: 0
{"_id":"5rLEs5ZzCn5tiYpKj","bibbaseid":"mcauliffe-wolcott-schaefer-kelem-hubbard-haley-isyourcomputerbeingmisusedasurveyofcurrentintrusiondetectionsystemtechnology-1990","downloads":0,"creationDate":"2016-02-09T22:41:32.122Z","title":"Is your computer being misused? A survey of current intrusion detection system technology.","author_short":["McAuliffe, J. N.","Wolcott, D.","Schaefer, L. J.","Kelem, N. L.","Hubbard, B.","Haley, T. K."],"year":1990,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/pablo j gonzalez?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2016-02-03T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["McAuliffe"],"firstnames":["J.","Noelle"],"suffixes":[]},{"propositions":[],"lastnames":["Wolcott"],"firstnames":["Dawn"],"suffixes":[]},{"propositions":[],"lastnames":["Schaefer"],"firstnames":["Lorrayne","J."],"suffixes":[]},{"propositions":[],"lastnames":["Kelem"],"firstnames":["Nancy","L."],"suffixes":[]},{"propositions":[],"lastnames":["Hubbard"],"firstnames":["Brian"],"suffixes":[]},{"propositions":[],"lastnames":["Haley"],"firstnames":["Theresa","K."],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/240cdda0387aef2b5d9203807df611353/dblp","booktitle":"ACSAC","crossref":"conf/acsac/1990","ee":"http://dx.doi.org/10.1109/CSAC.1990.143785","interhash":"9d429a9602fcd3a22427254b3898172a","intrahash":"40cdda0387aef2b5d9203807df611353","keywords":"dblp","pages":"260-272","publisher":"IEEE","timestamp":"2016-02-04T11:39:49.000+0100","title":"Is your computer being misused? A survey of current intrusion detection system technology.","url":"http://dblp.uni-trier.de/db/conf/acsac/acsac1990.html#McAuliffeWSKHH90","year":"1990","bibtex":"@inproceedings{conf/acsac/McAuliffeWSKHH90,\n added-at = {2016-02-03T00:00:00.000+0100},\n author = {McAuliffe, J. Noelle and Wolcott, Dawn and Schaefer, Lorrayne J. and Kelem, Nancy L. and Hubbard, Brian and Haley, Theresa K.},\n biburl = {http://www.bibsonomy.org/bibtex/240cdda0387aef2b5d9203807df611353/dblp},\n booktitle = {ACSAC},\n crossref = {conf/acsac/1990},\n ee = {http://dx.doi.org/10.1109/CSAC.1990.143785},\n interhash = {9d429a9602fcd3a22427254b3898172a},\n intrahash = {40cdda0387aef2b5d9203807df611353},\n keywords = {dblp},\n pages = {260-272},\n publisher = {IEEE},\n timestamp = {2016-02-04T11:39:49.000+0100},\n title = {Is your computer being misused? A survey of current intrusion detection system technology.},\n url = {http://dblp.uni-trier.de/db/conf/acsac/acsac1990.html#McAuliffeWSKHH90},\n year = 1990\n}\n\n","author_short":["McAuliffe, J. N.","Wolcott, D.","Schaefer, L. J.","Kelem, N. L.","Hubbard, B.","Haley, T. K."],"key":"conf/acsac/McAuliffeWSKHH90","id":"conf/acsac/McAuliffeWSKHH90","bibbaseid":"mcauliffe-wolcott-schaefer-kelem-hubbard-haley-isyourcomputerbeingmisusedasurveyofcurrentintrusiondetectionsystemtechnology-1990","role":"author","urls":{"Link":"http://dx.doi.org/10.1109/CSAC.1990.143785","Paper":"http://dblp.uni-trier.de/db/conf/acsac/acsac1990.html#McAuliffeWSKHH90"},"keyword":["dblp"],"downloads":0},"search_terms":["computer","being","misused","survey","current","intrusion","detection","system","technology","mcauliffe","wolcott","schaefer","kelem","hubbard","haley"],"keywords":["dblp"],"authorIDs":[],"dataSources":["Lao6JF73XpBJmfaxa"]}