Author:
Debar Hervé,Thomas Yohann,Boulahia-Cuppens Nora,Cuppens Frédéric
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Brackney, R.: Cyber-intrusion response. In: Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems, West Lafayette, IN, p. 413 (1998)
2. Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV. IEEE Computer Society Press, Los Alamitos (2002)
3. Petkac, M., Badger, L.: Security agility in response to intrusion detection. In: 16th Annual Computer Security Applications Conference (ACSAC 2000), New Orleans, LO, p. 11 (2000)
4. rfc3360: Inappropriate tcp resets considered harmful. RFC 3360 (2002),
http://www.ietf.org/rfc/rfc3360.txt
5. Cuppens, F., Gombault, S., Sans, T.: Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. In: 17th IEEE Computer Security Foundations Workshop (CSFW), Pacific Grove, CA (2004)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献