Deterring hacking strategies via targeting scanning properties
暂无分享,去创建一个
[1] Stuart McClure,et al. Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition , 2001 .
[2] Tadeusz Pietraszek,et al. Data mining and machine learning - Towards reducing false positives in intrusion detection , 2005, Inf. Secur. Tech. Rep..
[3] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[4] Meharouech Sourour,et al. Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[5] Giovanni Vigna,et al. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[6] Tom Markham,et al. Architecture and applications for a distributed embedded firewall , 2001, Seventeenth Annual Computer Security Applications Conference.
[7] Yan Zhang,et al. The Design and Implementation of Host-Based Intrusion Detection System , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[8] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[9] Norah Abokhodair,et al. Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.
[10] T. Holt,et al. Techcrafters and Makecrafters: A Comparison of Two Populations of Hackers , 2008, 2008 WOMBAT Workshop on Information Security Threats Data Collection and Sharing.
[11] Jian Bao,et al. Research on network security of defense based on Honeypot , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).