Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference60 articles.
1. Abbes, T., Bouhoula, A., & Rusinowitch, M. (2010). Efficient decision tree for protocol analysis in intrusion detection. International Journal of Security and Networks, 5(4), 220–235.
2. Alsubhi, K., Alhazmi, Y., Bouabdallah, N., & Boutaba, R. (2012). Security configuration management in intrusion detection and prevention systems. International Journal of Security and Networks, 7(1), 30–39.
3. Ampah, N., Akujuobi, C., Alam, S., & Sadiku, M. (2011). An intrusion detection technique based on continuous binary communication channels. International Journal of Security and Networks, 6(2–3), 174–180.
4. Anderson, D., Frivold, T., & Valdes, A. (1995). Next-generation intrusion-detection expert system (NIDES). Technical Report SRI-CSL-95-07, Computer Science Laboratory. SRI International.
5. Butt, A. R., et al. (2002). Fine-grain access control for securing shared resources in computational grids. In Proceedings of international parallel and distributed processing symposium, IPDPS (pp. 22–29).
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献