LARIAT: Lincoln adaptable real-time information assurance testbed
暂无分享,去创建一个
Jesse C. Rabek | L.M. Rossey | R.K. Cunningham | D.J. Fried | J.C. Rabek | R.P. Lippmann | J.W. Haines | M.A. Zissman | R. Lippmann | R. Cunningham | D. Fried | M. Zissman | J. Haines | J. Rabek | L.M. Rossey | Lee M. Rossey
[1] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[2] Richard P. Lippmann,et al. 1999 DARPA Intrusion Detection Evaluation: Design and Procedures , 2001 .
[3] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[4] Richard Lippmann,et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation , 2000, Recent Advances in Intrusion Detection.
[5] Greg Shipley,et al. Cover story: dragon claws its way to the top , 2001 .
[6] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.
[7] Don Libes. Exploring expect - a Tcl-based toolkit for automating interactive programs (2. ed.) , 1995 .
[8] Robert K. Cunningham,et al. Building Scenarios from a Heterogeneous Alert Stream , 2001 .
[9] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[10] Robert K. Cunningham,et al. Host-based Bottleneck Verification Efficiently Detects Novel Computer Attacks 1 , 1999 .
[11] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[12] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[13] Jonathan Korba. Windows NT Attacks for the Evaluation of Intrusion Detection Systems , 2000 .