EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. Active Defense of a Computer System using Autonomous Agents , 1995 .
[2] Yechiam Yemini,et al. Decentralizing control and intelligence in network management , 1995, Integrated Network Management.
[3] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[4] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[5] C RosenEric. Vulnerabilities of network control protocols , 1981 .
[6] Jon A. Rochlis,et al. With microscope and tweezers: the worm from MIT's perspective , 1989, Commun. ACM.
[7] Peter G. Neumann,et al. Computer-related risks , 1994 .
[8] D. E. Denning,et al. Analytical Techniques Development for a Statistical Intrusion Detection System (sids) Based on Accounting Records. Technical Report, 3.8 Clyde Digital Systems' Audit , 2007 .
[9] Livio Ricciulli,et al. Modeling Correlated Alarms in Network Management Systems , 1996 .
[10] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[11] G. Jakobson,et al. Alarm correlation , 1993, IEEE Network.
[12] M. Mansouri-Samani,et al. Monitoring distributed systems , 1993, IEEE Network.
[13] Paul M. Joyal. Industrial espionage today and information wars of tomorrow , 1996, Other Conferences.
[14] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[15] Salvatore J. Stolfo,et al. A coding approach to event correlation , 1995, Integrated Network Management.
[16] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[17] Eugene H. Spafford,et al. The internet worm: crisis and aftermath , 1989 .
[18] Richard A. Kemmerer,et al. Penetration state transition analysis: A rule-based intrusion detection approach , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.