Securing Industrial Control Systems through Autonomous Hardening
暂无分享,去创建一个
[1] Daniel A. Menascé,et al. On the Use of Performance Models to Design Self-Managing Computer Systems , 2003, Int. CMG Conference.
[2] Yechiam Yemini,et al. NESTOR: an architecture for network self-management and organization , 2000, IEEE Journal on Selected Areas in Communications.
[3] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[4] Vasant Honavar,et al. Intelligent agents for intrusion detection , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[5] Günter Karjoth,et al. Access control with IBM Tivoli access manager , 2003, TSEC.
[6] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[7] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[8] Daniel A. Menascé,et al. Policy-Based Enforcement of Database Security Configuration through Autonomic Capabilities , 2008, Fourth International Conference on Autonomic and Autonomous Systems (ICAS'08).
[9] Eugene H. Spafford,et al. Intrusion detection using autonomous agents , 2000, Comput. Networks.
[10] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[11] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[12] Paul Murray,et al. SmartFrog: Configuration and Automatic Ignition of Distributed Applications , 2003 .
[13] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.