Command Evaluation in Encrypted Remote Sessions
暂无分享,去创建一个
[1] N. Paulauskas,et al. Computer System Attack Classification , 2006 .
[2] V.A. Foroushani,et al. Intrusion detection in encrypted accesses with SSH protocol to network public servers , 2008, 2008 International Conference on Computer and Communication Engineering.
[3] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.
[4] Stephen R. Tate,et al. ProtoMon: embedded monitors for cryptographic protocol intrusion detection and prevention , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[5] Walter D. Potter,et al. A Blackboard-Based Learning Intrusion Detection System: A New Approach , 2003, IEA/AIE.
[6] Akira Yamada,et al. Intrusion Detection for Encrypted Web Accesses , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[7] Richard Lippmann,et al. The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection , 2002, RAID.
[8] J. Meigs,et al. WHO Technical Report , 1954, The Yale Journal of Biology and Medicine.
[9] Ming-Yuh Huang,et al. A large scale distributed intrusion detection framework based on attack strategy analysis , 1999, Comput. Networks.
[10] Robert Koch,et al. Changing Network Behavior , 2009, 2009 Third International Conference on Network and System Security.
[11] An Intrusion Detection System for Security Protocol Traffic , 2001 .
[12] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[13] Vik Tor Goh,et al. Experimenting with an Intrusion Detection System for Encrypted Networks , 2010, Int. J. Bus. Intell. Data Min..