A mobile agent-based P2P model for autonomous security hole discovery
暂无分享,去创建一个
Xin Wang | Xiangyang Xue | Ji Zheng | Kun Xiao | C. K. Toh
[1] Vasant Honavar,et al. Lightweight agents for intrusion detection , 2003, J. Syst. Softw..
[2] Chengqi Zhang,et al. MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agent , 2004 .
[3] Terry Martin,et al. Benchmarking Methodology for Firewall Performance , 2003, RFC.
[4] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[5] Shigeki Goto,et al. Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002).
[6] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[7] Shigeki Goto,et al. Remote attack detection method in IDA: MLSI-based intrusion detection with discriminant analysis , 2003 .
[8] Delbert Hart,et al. A P2P intrusion detection system based on mobile agents , 2004, ACM-SE 42.