RheoStat: Real-Time Risk Management
暂无分享,去创建一个
[1] Ruth M Davis. Guidelines for Automatic Data Processing Physical Security and Risk Management , 1974 .
[2] R. Lathe. Phd by thesis , 1988, Nature.
[3] Udo W. Pooch,et al. Adaptive agent-based intrusion response , 2001 .
[4] Udo W. Pooch,et al. Cooperating security managers: Distributed intrusion detection systems , 1996, Comput. Secur..
[5] Hans Kellerer,et al. A New Fully Polynomial Approximation Scheme for the Knapsack Problem , 1998, APPROX.
[6] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[7] Ashish Gehani,et al. Support for automated passive host-based intrusion response , 2003 .
[8] D.S. Bauer,et al. NIDX-an expert system for real-time network intrusion detection , 1988, [1988] Proceedings. Computer Networking Symposium.
[9] George Cybenko,et al. Quantitative risk analysis of computer networks , 2003 .
[10] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[11] Anthony J. Nadalin,et al. The Evolution of Java Security , 1998, IBM Syst. J..
[12] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .