An Intrusion Detection System by using Mapping Relations
暂无分享,去创建一个
Tai-hoon Kim | Debnath Bhattacharyya | J. Anitha | N. Thirupathi Rao | Tai-hoon Kim | D. Bhattacharyya | J. Anitha | N. Rao
[1] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[2] Yi Hu,et al. A data mining approach for database intrusion detection , 2004, SAC '04.
[3] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.