ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis
暂无分享,去创建一个
[1] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[2] R. Jagannathan,et al. A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[3] Christian Jahl. The information technology security evaluation criteria , 1991, [1991 Proceedings] 13th International Conference on Software Engineering.
[4] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[5] N. Habra,et al. Computer-aided prototyping: transformational approach , 1991 .
[6] H. Javitz,et al. IDES : The Enhanced Prototype A Real-Time Intrusion-Detection Expert System , 1988 .
[7] Teresa F. Lunt,et al. Knowledge-based intrusion detection , 1989, [1989] Proceedings. The Annual AI Systems in Government Conference.