An Approach based on Social Bees for an Intrusion Detection System by Scenario
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. An Application of Pattern Matching in Intrusion Detection , 1994 .
[2] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[3] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[4] L. Mé,et al. Détection d'intrusion dans un système informatique : méthodes et outils , 1996 .
[5] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[6] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Nathalie Dagorn. Détection et prévention d'intrusion : présentation et limites , 2006 .
[8] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .