Distributed audit trail analysis
暂无分享,去创建一个
[1] Jack Dongarra,et al. A User''s Guide to PVM Parallel Virtual Machine , 1991 .
[2] Naji Habra,et al. ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis , 1992, ESORICS.
[3] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[4] R. Jagannathan,et al. A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[5] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[6] Timothy G. MATTSONz. Parallel Programming Systems for Workstation Clusters , 1993 .
[7] Marshall T. Rose,et al. The Open book - a practical perspective on OSI , 1990 .
[8] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.