Network intrusion detection
暂无分享,去创建一个
[1] Tom Burr,et al. Software Toolkit for Analysis Research (STAR) , 1993 .
[2] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[3] Biswanath Mukherjee,et al. Detecting intrusions through attack signature analysis , 1991 .
[4] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[7] Steven M. Bellovin,et al. There Be Dragons , 1992, USENIX Summer.
[8] Peter G. Neumann,et al. IDES: A Progress Report , 1990 .