Study of intrusion detection systems
暂无分享,去创建一个
[1] A. Raghunathan,et al. Battery-driven system design: a new frontier in low power design , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[2] Michael Hurwicz. Cracker tracking: tighter security with intrusion detection , 1998 .
[3] Susan C. Lee,et al. Training a neural-network based intrusion detector to recognize novel attacks , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[4] A. N. Zincir-Heywood,et al. Intrusion Detection Systems , 2008 .
[5] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[6] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Trevor N. Mudge,et al. Power: A First-Class Architectural Design Constraint , 2001, Computer.
[8] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[9] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[10] M. Gordeev. Intrusion Detection: Techniques and Approaches , 2003 .