Attack Evaluation and Mitigation Framework
暂无分享,去创建一个
[1] Matt Carlson,et al. INTRUSION DETECTION AND PREVENTION SYSTEMS , 2006 .
[2] John Wack,et al. Guidelines on Firewalls and Firewall Policy , 2002 .
[3] S. K. Srivatsa,et al. Detecting and preventing attacks using network intrusion detection systems , 2008 .
[4] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[5] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[6] Hossein Shirazi,et al. Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall , 2009, 2009 International Joint Conference on Artificial Intelligence.
[7] Karen Scarfone,et al. Intrusion Detection and Prevention Systems , 2010, Handbook of Information and Communication Security.
[8] Boleslaw K. Szymanski,et al. Denial of Service Intrusion Detection Using Time Dependent Deterministic Finite Automata , 2002 .
[9] Lance Spitzner,et al. The Honeynet Project: Trapping the Hackers , 2003, IEEE Secur. Priv..