Simulating Concurrent Intrusionsfor Testing Intrusion Detection Systems : Parallelizing Intrusions
暂无分享,去创建一个
[1] David A. Padua,et al. Dependence graphs and compiler optimizations , 1981, POPL '81.
[2] Ken Kennedy,et al. Conversion of control dependence to data dependence , 1983, POPL '83.
[3] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[4] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[5] Utpal Banerjee,et al. Dependence analysis for supercomputing , 1988, The Kluwer international series in engineering and computer science.
[6] Paul S. Wang. An Introduction to Berkeley Unix , 1988 .
[7] Zhiyuan Li,et al. An Efficient Data Dependence Analysis for Parallelizing Compilers , 1990, IEEE Trans. Parallel Distributed Syst..
[8] Don Libes,et al. expect: Curing Those Uncontrollable Fits of Interaction , 1990, USENIX Summer.
[9] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[10] Harold Joseph Highland,et al. Testing Intrusion Detection Systems: Design Methodologies and Results from an Early Prototype , 1995 .