Low-Level Network Attack Recognition : A Signature-Based Approach ∗
暂无分享,去创建一个
[1] Stephen Northcutt,et al. Intrusion Signatures and Analysis , 2001 .
[2] P. H. Jackson,et al. Statistical analysis in psychology and education , 1960 .
[3] Naji Habra,et al. ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis , 1992, ESORICS.
[4] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[5] Thomas Spyrou,et al. Intention modelling: approximating computer user intentions for detection and prediction of intrusions , 1996, SEC.
[6] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[7] Quinn McNemar,et al. Statistical Analysis in Psychology and Education. , 1967 .
[8] Marcus J. Ranum,et al. Implementing a generalized tool for network monitoring , 1997, Inf. Secur. Tech. Rep..
[9] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[10] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .