Intrusion detection: methods and systems. Part II
暂无分享,去创建一个
[1] Matt Bishop. A model of security monitoring , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.
[2] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[3] Philip K. Chan,et al. Detecting novel attacks by identifying anomalous network packet headers , 2001 .
[4] Nathalie Weiler,et al. Honeypots for distributed denial-of-service attacks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[5] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[6] Jeannette M. Wing. Vulnerability Analysis of Networked Systems , 2002, WETICE.
[7] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[9] Kathleen A. Jackson. INTRUSION DETECTION SYSTEM (IDS) PRODUCT SURVEY , 1999 .
[10] Aurobindo Sundaram,et al. An introduction to intrusion detection , 1996, CROS.
[11] Victor K.-W. Wei,et al. Preemptive distributed intrusion detection using mobile agents , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[12] Salvatore J. Stolfo,et al. Adaptive Model Generation for Intrusion Detection Systems , 2000 .
[13] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[14] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[15] Stephen Northcutt,et al. Network Intrusion Detection: An Analyst's Hand-book , 1999 .
[16] Eleazar Eskin,et al. Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.
[17] Andrew Harrison Gross,et al. Analyzing computer intrusions , 1998 .
[18] E. Amoroso. Intrusion Detection , 1999 .
[19] K. A. Jackson,et al. An expert system application for network intrusion detection , 1991 .
[20] K. A. Jackson,et al. An automated computer misuse detection system for UNICOS , 1994 .
[21] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, S&P 1997.
[22] K. A. Jackson,et al. A phased approach to network intrusion detection , 1991 .
[23] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.