Detection of Intrusions and Malware & Vulnerability Assessment
暂无分享,去创建一个
William Robertson | Christopher Kruegel | S. Burschka | K. Burbeck | M. Semling | Tobias Chyssler | Tomas Lingvall
[1] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[2] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[3] Vern Paxson,et al. Active mapping: resisting NIDS evasion without altering traffic , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[5] Peng Ning,et al. Learning attack strategies from intrusion alerts , 2003, CCS '03.
[6] Hervé Debar,et al. M2D2: A Formal Data Model for IDS Alert Correlation , 2002, RAID.
[7] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .