Author:
Lee Ki-Hyun,Park Young B.
Reference9 articles.
1. Pwc, Insight from The Global State of Information Security Survey.
http://www.pwc.com
2. Roesch, M.: Snort: lightweight intrusion detection for networks. In: LISA, vol. 99, no. 1, pp. 229–238 (1999)
3. Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255–264. ACM (2002)
4. Kaur, S., Singh, M.: Automatic attack signature generation systems: a review. IEEE Secur. Priv. 11(6), 54–61 (2013)
5. Mohammed, M.M., Chan, H.A., Ventura, N.: Honeycyber: automated signature generation for zero-day polymorphic worms. In: MILCOM 2008-2008 IEEE Military Communications Conference, pp. 1–6. IEEE (2008)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献