An Competent Intrusion Detection System using
暂无分享,去创建一个
[1] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[2] Rensheng Wang,et al. Search Strategy Optimization for Intruder Detection , 2007, IEEE Sensors Journal.
[3] Lilly Suriani Affendey,et al. Intrusion detection using data mining techniques , 2010, 2010 International Conference on Information Retrieval & Knowledge Management (CAMP).
[4] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[5] Joseph G. Tront,et al. Internet Security: Intrusion Detection and Prevention in Mobile Systems , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[6] David J. Marchette. A Statistical Method for Profiling Network Traffic , 1999, Workshop on Intrusion Detection and Network Monitoring.
[7] Jerzy W. Rozenblit,et al. Alert Fusion for a Computer Host Based Intrusion Detection System , 2007, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07).
[8] Vivek K. Kshirsagar,et al. Intrusion Detection System using Genetic Algorithm and Data Mining: An Overview , 2012 .
[9] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[10] Frederick M. Avolio. Putting it together a multi-dimensional approach to Internet security , 1998, NTWK.