Resilient infrastructure for network security
暂无分享,去创建一个
[1] Danilo Bruschi,et al. Disarming offense to facilitate defense , 2001, NSPW '00.
[2] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[3] Stephanie Forrest,et al. Automated response using system-call delays , 2000 .
[4] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[5] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Danilo Bruschi,et al. AngeL: a tool to disarm computer systems , 2001, NSPW '01.
[7] Stephanie Forrest,et al. Operating system stability and security through process homeostasis , 2002 .
[8] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[9] Matthew M. Williamson,et al. Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.
[10] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[11] Frederick B. Cohen,et al. A short course on computer viruses (2nd ed.) , 1994 .
[12] Matthew M. Williamson. Design, implementation and test of an email virus throttle , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[13] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[14] Eric Rescorla. Security Holes . . . Who Cares? , 2003, USENIX Security Symposium.