Author:
Debar Hervé,Thomas Yohann,Cuppens Frédéric,Cuppens-Boulahia Nora
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Computer Science (miscellaneous)
Reference26 articles.
1. Thomas, Y., Debar, H., Morin, B.: Improving security management through passive network observation. In: ARES ’06: Proceedings of the 1st International Conference on Availability, Reliability and Security (ARES’06), pp. 382–389. IEEE Computer Society, USA (2006)
2. Brackney, R.: Cyber-intrusion response. In: Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems, West Lafayette, IN, p. 413 (1998)
3. Petkac, M., Badger, L.: Security agility in response to intrusion detection. In: Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC’00), New Orleans, LO, USA, p. 11 (2000)
4. Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC). IEEE Computer Society Press, Las Vegas, NV, USA (2002)
5. Floyd, S.: Inappropriate TCP Resets Considered Harmful. RFC 3360 http://www.ietf.org/rfc/rfc3360.txt. (2002)
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献