Author:
Tripathi Anand R.,Koka Muralidhar,Karanth Sandeep,Pathak Abhijit,Ahmed Tanvir
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response. National Institute of Standards and Technology Interim Report-6416 (1999)
2. Fuggetta, A., Picco, G.P., Vigna, G.: Understanding Code Mobility. IEEE Transactions on Software Engineering 24 (1998) 342–361
3. Harrison, C.G., Chess, D.M., Kershenbaum, A.: Mobile Agents: Are they a good idea? Technical report, IBM Research Division, T.J.Watson Research Center (1995) Available at URL http://www.research.ibm.com/massdist/mobag.ps .
4. White, G.B., Fisch, E., Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network 10 (1996) 20–23
5. Stallings, W.: SNMP and SNMPv2: the infrastructure for network management. IEEE Communications Magazine 36 (1998) 37–43
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献