Détection et prévention d'intrusion : présentation et limites
暂无分享,去创建一个
[1] Christophe Bidan,et al. An Improved Reference Flow Control Model for Policy-Based Intrusion Detection , 2003, ESORICS.
[2] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[3] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[4] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[5] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[6] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[7] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.