Network and Topology Models to Support IDS Event Processing
暂无分享,去创建一个
[1] Hervé Debar,et al. The Intrusion Detection Message Exchange Format (IDMEF) , 2007, RFC.
[2] Joint Task Force Transformation Initiative. Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach , 2014 .
[3] Jürgen Schönwälder,et al. Network Configuration Protocol (NETCONF) , 2011, RFC.
[4] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[5] Giovanni Vigna,et al. A Topological Characterization of TCP/IP Security , 2003, FME.
[6] Martin Björklund,et al. YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF) , 2010, RFC.
[7] Andy Bierman. Guidelines for Authors and Reviewers of YANG Data Model Documents , 2011, RFC.
[8] Frederic Massicotte,et al. Passive Network Discovery for Real Time Situation Awareness , 2004 .
[9] Hervé Debar,et al. M2D2: A Formal Data Model for IDS Alert Correlation , 2002, RAID.
[10] Eric B. Decker,et al. Definitions of Managed Objects for Bridges , 1993, RFC.
[11] Jürgen Schönwälder. Common YANG Data Types , 2010, RFC.
[12] Christian Haas,et al. Design and Architecture of an Industrial IT Security Lab , 2016, TRIDENTCOM.
[13] Alex Clemm,et al. A Data Model for Network Topologies , 2015 .