Intrusion confinement by isolation in information systems
暂无分享,去创建一个
[1] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[2] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[3] Shiuh-Pyng Shieh,et al. On a Pattern-Oriented Model for Intrusion Detection , 1997, IEEE Trans. Knowl. Data Eng..
[4] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[6] Sushil Jajodia,et al. Application-level isolation to cope with malicious database users , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[7] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[8] Shiuh-Pyng Shieh,et al. A pattern-oriented intrusion-detection model and its applications , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Richard A. Kemmerer,et al. Penetration state transition analysis: A rule-based intrusion detection approach , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[10] Alley Stoughton,et al. Detection of Mutual Inconsistency in Distributed Systems , 1983, IEEE Transactions on Software Engineering.
[11] John P. McDermott,et al. Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[12] Sushil Jajodia,et al. Abstraction-based misuse detection: high-level specifications and adaptable strategies , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[13] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[14] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.
[15] John P. McDermott,et al. Storage Jamming , 1995, DBSec.