The “ART” of log correlation: part 1
暂无分享,去创建一个
[1] Eoghan Casey,et al. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs , 2004, Digit. Investig..
[2] Cristina L. Abad,et al. Log correlation for intrusion detection: a proof of concept , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[3] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[4] Dominique Brodbeck,et al. A Visual Approach for Monitoring Logs , 1998, LISA.
[5] Dario V. Forte. Analyzing the Difficulties in Backtracing Onion Router Traffic , 2002, Int. J. Digit. EVid..