Safeguarding Critical Infrastructures
暂无分享,去创建一个
[1] Simin Nadjm-Tehrani,et al. Alarm reduction and correlation in defence of IP networks , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[2] David Heckerman,et al. A Tutorial on Learning with Bayesian Networks , 1998, Learning in Graphical Models.
[3] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[4] Simin Nadjm-Tehrani,et al. Scale-up and performance studies of three agent platforms , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[5] Ning Lu,et al. Safeguarding SCADA Systems with Anomaly Detection , 2003, MMM-ACNS.
[6] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[7] Simin Nadjm-Tehrani,et al. Time as a Metric for Defence in Survivable Networks , 2003 .
[8] Simin Nadjm-Tehrani,et al. ADWICE - Anomaly Detection with Real-Time Incremental Clustering , 2004, ICISC.
[9] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[10] Roch Guérin,et al. Implementation and performance measurements of QoS routing extensions to OSPF , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[11] Stefan Savage,et al. The Spread of the Sapphire/Slammer Worm , 2003 .
[12] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[13] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[14] John McHugh,et al. Intrusion and intrusion detection , 2001, International Journal of Information Security.