Author:
Byrski Aleksander,Carvalho Marco
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Dasgupta, D.: Artificial Immune Systems and Their Applications. Springer, New York (1998)
2. Lecture Notes in Computer Science;J.Y.L. Boudec,2004
3. Anderson, J.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA (1980)
4. Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222–232 (1987)
5. Ilgun, K., Kemmerer, R., Porras, P.: State transition analysis: A rule-based intrusion detection approach. Software Engineering 21(3), 181–199 (1995)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献