Network Attack Characteristics of Automatic Data Extraction Technology
暂无分享,去创建一个
[1] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[2] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[3] Urjita Thakar,et al. HoneyAnalyzer – Analysis and Extraction of Intrusion Detection Patterns & Signatures Using Honeypot , 2005 .
[4] Piotr Kijewski. Automated Extraction of Threat Signatures from Network Flows , 2006 .
[5] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[6] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.