Author:
Winter Philipp,Lampesberger Harald,Zeilinger Markus,Hermann Eckehard
Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Engineering,General Environmental Science
Reference25 articles.
1. Snort,
http://www.snort.org
.
2. Bro Intrusion Detection System,
http://www.bro-ids.org
.
3. D. E. Denning, „An intrusion-detection model,“ IEEE Trans. Softw. Eng., vol. 13, pp. 222–232, February 1987.
4. R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” IEEE Symposium on Security and Privacy, pp. 305–316, 2010.
5. S. Axelsson, “The base-rate fallacy and its implications for the difficulty of intrusion detection,” in CCS’ 99: Proceedings of the 6th ACM conference on Computer and Communications Security. New York, NY, USA: ACM, 1999, pp. 1–7.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献