Author:
Debar Hervé,Viinikka Jouni
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference10 articles.
1. Debar, H. and Morin, B. (2002), “Evaluation of the diagnostic capabilities of commercial intrusion detection systems”,Proceedings of the Fifth International Workshop on the Recent Advances in Intrusion Detection (RAID).
2. Debar, H., Curry, D. and Feinstein, B. (2005), “The intrusion detection message exchange format”,Internet Draft, work in progress, expires July 31, 2005, this document is currently being updated and will reappear either as an Internet draft or a RFC.
3. Droms, R. (1997), “Dynamic host configuration protocol”,RFC, Vol. 2131.
4. Egevang, K. and Francis, P. (1994), “The IP network address translator (nat)”,RFC, Vol. 1631.
5. Julisch, K. (2001), “Mining alarm clusters to improve alarm handling efficiency”,Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC).
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献