Author:
Lee Soojin,Chung Byungchun,Kim Heeyoul,Lee Yunho,Park Chanil,Yoon Hyunsoo
Subject
Law,General Computer Science
Reference16 articles.
1. Bloedorn E, Christiansen AD, Hill W, Skorupka C, Talbot LM, Tivel J. Data mining for network intrusion detection: how to get started. MITRE Technical Report; August 2001.
2. Browne H, Arbaugh W, McHugh J, Fithen W. A trend analysis of exploitations. In: Proceedings of the 2001 IEEE symposium on security and privacy; May 2001. p. 214–29.
3. Cuppens F. Cooperative intrusion detection. In: International symposium “Information Superiority: Tools for Crisis and Conflict-Management”. Paris, France; September 2001a.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献