Intrusion detection using autonomous agents
暂无分享,去创建一个
[1] Stephanie Forrest,et al. An immunological model of distributed detection and its application to computer security , 1999 .
[2] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[3] Biswanath Mukherjee,et al. Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[4] David Futato. Perl module reference , 1998 .
[5] DetectionThomas H. Ptacektqbf,et al. Insertion , Evasion , andDenial of Service : Eluding Network Intrusion , 1998 .
[6] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[7] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[8] Jeffrey M. Bradshaw,et al. An introduction to software agents , 1997 .
[9] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[10] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[11] Udo W. Pooch,et al. Cooperating security managers: a peer-based intrusion detection system , 1996, IEEE Netw..
[12] Eugene H. Spafford,et al. IDIOT - Users Guide , 1996 .
[13] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[14] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[15] Eugene H. Spafford,et al. Active Defense of a Computer System using Autonomous Agents , 1995 .
[16] Eugene H. Spafford,et al. Defending a Computer System Using Autonomous Agents , 1995 .
[17] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[18] Michael R. Genesereth,et al. Software agents , 1994, CACM.
[19] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[20] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[21] Steven R. Snapp,et al. The DIDS (Distributed Intrusion Detection System) Prototype , 1992, USENIX Summer.
[22] T. Lunt. A Real-Time Intrusion Detection Expert System (IDES)-Final Report , 1992 .
[23] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[24] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[25] Intrusion Detection Systems and A View To Its Forensic Applications , .