Attack trends in present computer networks
暂无分享,去创建一个
[1] C. Czosseck,et al. Requirements for a Future EWS - Cyber Defence in the Internet of the Future , 2011 .
[2] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[3] Hector Garcia-Molina,et al. Data Leakage Detection , 2011, IEEE Transactions on Knowledge and Data Engineering.
[4] Ronald D. Williams,et al. Taxonomies of attacks and vulnerabilities in computer systems , 2008, IEEE Communications Surveys & Tutorials.
[5] Marc Dacier,et al. A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.
[6] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[7] Ali Movaghar-Rahimabadi,et al. Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.
[8] Dennis J. Turner,et al. Symantec Internet Security Threat Report Trends for July 04-December 04 , 2005 .
[9] David Hylender,et al. Data Breach Investigations Report , 2011 .
[10] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[11] Yong Wang,et al. A review of classification methods for network vulnerability , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[12] Michael McCormick,et al. Data Theft: A Prototypical Insider Threat , 2008, Insider Attack and Cyber Security.
[13] Damiano Bolzoni,et al. Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .
[14] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[15] Robert Koch. Towards next-generation Intrusion Detection , 2011, 2011 3rd International Conference on Cyber Conflict.