Modelling and solving the intrusion detection problem in computer networks
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. An Application of Pattern Matching in Intrusion Detection , 1994 .
[2] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[4] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[6] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[7] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[8] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[9] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[10] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.