DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype
暂无分享,去创建一个
Biswanath Mukherjee | Karl N. Levitt | Gihan Dias | L. Todd Heberlein | Steven R. Snapp | James Brentano | Terrance L. Goan | Che-Lin Ho | Stephen E. Smaha | Tim Grance | Daniel M. Teal | Doug Mansur | S. E. Smaha | L. T. Heberlein | B. Mukherjee | K. Levitt | T. Grance | D. Mansur | Gihan V. Dias | Terrance Goan | James Brentano | C. Ho
[1] Gunar E. Liepins,et al. Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[2] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[3] Bill Landreth,et al. Out of the inner circle : a hacker's guide to computer security , 1985 .
[4] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Peter G. Neumann,et al. IDES: A Progress Report , 1990 .