
[35] The European Union 95/46/EC Directive on Data Privacy - compliance October 1998 - and
individual EU member state privacy legislation - various compliance dates
http://europa.eu.int/comm/internal_market/en/dataprot/
[36] EU/US Safe Harbor - compliance 11/1/2000 www.export.gov/safeharbor
http://europa.eu.int/comm/internal_market/en/dataprot/modelcontracts/index.htm
[37] J. Habra, B. Le Charlier, A. Mounji, and I. Mathieu. ASAX: Software architecture and rule-
based language for universal audit trail analysis. In Y. Deswarte et al., editors, Computer
Security – Proceedings of ESORICS 92, volume 648 of LNCS, pages 435–450, Toulouse,
France, Nov. 23–25, 1992. Springer-Verlag.
[38] L. T. Heberlein et al. A network security monitor. In Proceedings of the 1990 IEEE
Symposium on Security and Pri-vacy, pages 296–304, Oakland, California, May 7–9, 1990.
[39] K. Ilgun. USTAT: A real-time intrusion detection system for UNIX. In Proceedings of the
1993 IEEE Symposium on Security and Privacy, pages 16–28, Oakland, California, May 24–
26, 1993.
[40] U. Lindqvist and P. A. Porras. Detecting computer and network misuse through the
production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE
Symposium on Security and Privacy, pages 146–161, Oakland, California, May 9–12, 1999.
[41] R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. Analysis and results of the
1999 DARPA off-line intrusion detection evaluation. In H. Debar, L. M´ e, and S. F. Wu,
editors, Recent Advances in Intrusion Detection (RAID 2000), volume 1907 of LNCS, pages
162–182, Toulouse, France, Oct. 2–4, 2000. Springer-Verlag.
[42] A. Mounji. Languages and Tools for Rule-Based Distributed Intrusion Detection. PhD
thesis, Institut d’Informatique, University of Namur, Belgium, Sept. 1997.
[43] P. G. Neumann and P. A. Porras. Experience with EMERALD to date. In Proceedings of the
1st Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, Apr.
9–12, 1999. The USENIX Association.
[44] A. One. Smashing the stack for fun and profit. Phrack Magazine, 7(49), Nov. 8, 1996.
http://www.fc.net/phrack/files/ p49/p49-14.
[45] J. Picciotto. The design of an effective auditing subsystem. In Proceedings of the 1987 IEEE
Symposium on Security and Privacy, pages 13–22, Oakland, California, Apr. 27–29, 1987.
[46] P. A. Porras and R. A. Kemmerer. Penetration state transitionanalysis: A rule-based
intrusion detection approach. In Proceedings of the Eighth Annual Computer Security Ap-
plications Conference, pages 220–229, San Antonio, Texas, Nov. 30–Dec. 4, 1992.
[47] P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to
anomalous live disturbances. In Proceedings of the 20th National Information Systems
Security Conference, pages 353–365, Baltimore, Maryland, Oct. 7–10, 1997. National
Institute of Standards and Tech-nology/National Computer Security Center.
[48] P. Proctor. Audit reduction and misuse detection in heterogeneous environments:
Framework and application. In Proceedings of the Tenth Annual Computer Security
Applications Conference, pages 117–125, Orlando, Florida, Dec. 5–9, 1994.
[49] T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network
intrusion detection. Technical report, Secure Networks, Inc., Calgary, Alberta, Canada, Jan.
1998. http://www.clark.net/˜roesch/idspaper.html.
[50] M. M. Sebring, E. Shellhouse, M. E. Hanna, and R. A. Whitehurst. Expert systems in
intrusion detection: A case study. In Proceedings of the 11th National Computer Security
Conference, pages 74–81, Baltimore, Maryland, Oct. 17–20, 1988. National Institute of
Standards and Technology/National Computer Security Center.
[51] Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, CA 94303, USA. SunSHIELD
Basic Security Module Guide, Solaris 7, Oct. 1998. Part No. 805-2635-10.
[52] U.S. Department of Defense. Trusted Computer System Evaluation Criteria, Dec. 1985.
DoD 5200.28-STD.
[53] A. Valdes and K. Skinner. Adaptive, model-based monitoring for cyber attack detection. In
H. Debar, L. M´ e,and S. F. Wu, editors, Recent Advances in Intrusion De-tection (RAID
124