The application of bioinformatics to network intrusion detection
暂无分享,去创建一个
[1] M S Waterman,et al. Identification of common molecular subsequences. , 1981, Journal of molecular biology.
[2] D. Lipman,et al. The multiple sequence alignment problem in biology , 1988 .
[3] M. I. Kanehisa,et al. Pattern recognition in nucleic acid sequences. I. A general method for finding local homologies and symmetries , 1982, Nucleic Acids Res..
[4] Michael J. Fischer,et al. The String-to-String Correction Problem , 1974, JACM.
[5] Christus,et al. A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .
[6] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[7] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .