Author:
Jacob Grégoire,Debar Hervé,Filiol Eric
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Computer Science (miscellaneous)
Reference72 articles.
1. Cohen, F.: Computer viruses. Ph.D. thesis, University of South California (1986)
2. Cohen F.B. (1987). Computer viruses: Theory and experiments. Comput. Secur. 6(1): 22–35
3. Debar H., Dacier M. and Wespi A. (1999). Towards a taxonomy of intrusion-detection systems. Comput. Netw. Spl Issue Comput. Netw. Secur. 31(9): 805–822
4. Mé, L., Morin, B.: Intrusion detection and virology: an analysis of differences, similarities and complementariness. In: Bonfante, G., Marion, J.-Y. (eds.) J. Comput. Virol., vol. 3, no. 1, WTCV’06 Special Issue, pp. 39–49 (2007)
5. Anderson, J.: Computer security threat monitoring and surveillance. Tech. rep., James P. Anderson Company (1980)
Cited by
100 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献