Design and implementation of Web service honeypot
暂无分享,去创建一个
[1] Yun Wang,et al. Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection , 2008 .
[2] Jingtao Yao,et al. An Enhanced Support Vector Machine Model for Intrusion Detection , 2006, RSKT.
[3] Adel Bouhoula,et al. Experimental analysis of attacks against web services and countermeasures , 2010, iiWAS.
[4] Sheng-Hsun Hsu,et al. Application of SVM and ANN for intrusion detection , 2005, Comput. Oper. Res..
[5] S. Sathiya Keerthi,et al. Improvements to the SMO algorithm for SVM regression , 2000, IEEE Trans. Neural Networks Learn. Syst..
[6] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[7] Urjita Thakar,et al. Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services , 2010 .
[8] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[9] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[10] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).