Cooperative intrusion detection for the next generation carrier: ethernet
暂无分享,去创建一个
[1] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[2] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[3] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[4] Hyong S. Kim,et al. Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Stefan Savage,et al. Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.
[7] Karl N. Levitt,et al. Using Specification-Based Intrusion Detection for Automated Response , 2003, RAID.
[8] Karl N. Levitt,et al. A Specification-Based Intrusion Detection Model for OLSR , 2005, RAID.
[9] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[10] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[11] Christopher Krügel,et al. Intrusion Detection and Correlation - Challenges and Solutions , 2004, Advances in Information Security.
[12] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[13] R. Sekar,et al. Experiences with Specification-Based Intrusion Detection , 2001, Recent Advances in Intrusion Detection.
[14] Ana R. Cavalli,et al. An EFSM-Based Intrusion Detection System for Ad Hoc Networks , 2005, ATVA.
[15] Gordon Bell,et al. Ethernet: Distributed Packet Switching for Local Computer Networks , 1976 .