Author:
Schmerl Sebastian,Vogel Michael,König Hartmut
Publisher
Springer Science and Business Media LLC
Subject
Information Systems,Software
Reference16 articles.
1. Ranum, M.J.: Challenges for the future of intrusion detection. Invited Talk, 5th International Symposium on Recent Advances in Intrusion Detection (RAID), Zürich (2002)
2. Liang, Z., Sekar, R.: Fast and automated generation of attack signatures: a basis for building self-protecting servers. In: Proceedings of 12th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA (2005)
3. Nanda, S., Chiueh, T.: Execution trace-driven automated attack signature generation. In: Proceedings of 24th Annual Computer Security Applications Conference (ACSAC), pp. 195–204, Anaheim, CA, USA. IEEE Computer Society (2008)
4. Vigna, G., Eckmann, S.T., Kemmerer, R.A.: The STAT tool suite. In: Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX) 2000, vol. 2, pp. 46–55. IEEE Computer Society Press, Hilton Head (2000)
5. Eckmann S.T., Vigna G., Kemmerer R.A.: STATL: an attack language for state-based intrusion detection. J. Comput. Secur. 10(1/2), 71–104 (2002)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献