Publisher
Kluwer Academic Publishers
Reference17 articles.
1. D. Anderson, J. Cobb, E. Korpela, M. Lebofsky and D. Werthimer, SETI@home, Communications of the ACM, vol. 45(11), pp. 56–62, 2002.
2. M. Bishop, Computer Security: Art and Science, Addison-Wesley, Reading, Massachusetts, 2003.
3. A. Chuvakin, Security event analysis through correlation, Information Systems Security, vol. 2(13), pp. 13–18, 2004.
4. D. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, vol. 13(2), pp. 222–231, 1987.
5. FOLDING@home (folding.stanford.edu).