Intrusion Detection Inter-component Adaptive Negotiation
暂无分享,去创建一个
Karl N. Levitt | Stuart Staniford-Chen | Stephen Wu | Mark R. Heckman | Dave Peticolas | Richard J. Feiertag | Rick Crawford | Lee Benzinger | Sue Rho
[1] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[2] Joachim Thees. Protocol Implementation with Estelle from Prototypes to Efficient Implementations 1 , 1998 .
[3] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[4] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5] Charles E. Kahn,et al. A common intrusion detection framework , 2000 .
[6] B. Tung. The Common Intrusion Specification Language: a retrospective , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.