Distributed agent-based real time network intrusion forensics system architecture design
暂无分享,去创建一个
[1] Michael S. Greenberg,et al. Network Forensics Analysis , 2002, IEEE Internet Comput..
[2] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[3] Andrew H. Sung,et al. Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques , 2003, Int. J. Digit. EVid..
[4] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[5] Angelos D. Keromytis,et al. xPF: packet filtering for low-cost network monitoring , 2002, Workshop on High Performance Switching and Routing, Merging Optical and IP Technologie.
[6] Fulvio Risso,et al. An architecture for high performance network analysis , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.
[7] Sotiris Ioannidis,et al. Practical Network Applications on a Lightweight Active Management Environment , 2001, IWAN.
[8] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[9] Nicholas R. Jennings,et al. Agent Theories, Architectures, and Languages: A Survey , 1995, ECAI Workshop on Agent Theories, Architectures, and Languages.
[10] Steven McCanne,et al. The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.
[11] Alec Yasinsac,et al. Policies to Enhance Computer and Network Forensics , 2001 .
[12] Nicholas R. Jennings,et al. Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.