Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
暂无分享,去创建一个
[1] Miguel Correia,et al. Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.
[2] B. Harrison. Las Vegas, Nevada , 2002 .
[3] Giovanni Vigna,et al. A stateful intrusion detection system for World-Wide Web servers , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[4] Debin Gao,et al. Behavioral Distance for Intrusion Detection , 2005, RAID.
[5] James C. Reynolds,et al. Learning unknown attacks - a start , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[6] Bruno d'Ausbourg,et al. Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem , 1996, J. Comput. Secur..
[7] Debin Gao,et al. Behavioral Distance Measurement Using Hidden Markov Models , 2006, RAID.
[8] Eric Totel,et al. COTS Diversity Based Intrusion Detection and Application to Web Servers , 2005, RAID.
[9] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[10] Pierre-Antoine Champin,et al. Measuring the Similarity of Labeled Graphs , 2003, ICCBR.
[11] Bharathi. N-Version programming method of Software Fault Tolerance: A Critical Review , 2003 .