Network Intrusion Detection and its strategic importance
暂无分享,去创建一个
Talha A. Khan | M. K. Asif | Muhammad K. Asif | Talha A. Taj | Umar Naeem | Sufyan Yakoob | T. Taj | T. Khan | Umar Naeem | S. Yakoob
[1] Yuebin Bai,et al. Intrusion Detection Systems: technology and development , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..
[2] D. Dasgupta,et al. Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.
[3] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[4] Song Naiping,et al. A Study on Intrusion Detection Based on Data Mining , 2010, 2010 International Conference of Information Science and Management Engineering.
[5] David Cornforth,et al. An overview of recent advances in intrusion detection , 2008, 2008 8th IEEE International Conference on Computer and Information Technology.
[6] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[7] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[8] Evgeniya Nikolova,et al. Anomaly Based Intrusion Detection Using Data Mining and String Metrics , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[9] Mallikarjun Shankar,et al. Fusing intrusion data for detection and containment , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..