VICTORIA UNIVERSITY OF WELLINGTON
暂无分享,去创建一个
[1] Zhiguang Qin,et al. Honeypot: a supplemented active defense system for network security , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[2] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[3] Clifford Stoll,et al. Stalking the wily hacker , 1988, CACM.
[4] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[5] B. Cheswick. An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied , 1997 .
[6] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[7] Dominique Alessandri,et al. Towards a Taxonomy of Intrusion Detection Systems and Attacks , 2001 .
[8] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[9] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, S&P 1997.
[10] Timothy W. Finin,et al. A Target-Centric Ontology for Intrusion Detection , 2003, IJCAI 2003.