The Prevention Threat of Behavior-based Signature using Pitcher Flow Architecture
暂无分享,去创建一个
[1] Jun Murai,et al. Behavior rule based intrusion detection , 2009, Co-Next Student Workshop '09.
[2] Yuan-Cheng Lai,et al. Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems , 2009, 2009 IEEE International Conference on Communications.
[3] Young U. Ryu,et al. Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..
[4] A. Piskozub,et al. Real-Time Intrusion Prevention and Anomaly Analyze System for Corporate Networks , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[5] Rubo Zhang,et al. A new intrusion detection method based on behavioral model , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[6] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[7] Matthew V. Mahoney,et al. Network traffic anomaly detection based on packet bytes , 2003, SAC '03.