27. Intrusion Detection and Intrusion Prevention Devices
暂无分享,去创建一个
[1] Daniel F. Sterne,et al. Auditing: a relevant contribution to trusted database management systems , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.
[2] Eugene H. Spafford,et al. Defending a Computer System Using Autonomous Agents , 1995 .
[3] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[4] K. A. Jackson,et al. An expert system application for network intrusion detection , 1991 .
[5] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[6] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[7] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[8] A Saritha,et al. A system for detecting network intruders in real-time , 2016 .