Author:
Han Sang-Jun,Cho Sung-Bae
Subject
Law,General Computer Science
Reference22 articles.
1. CERTCC-KR, Security Incident Statistic in Korea, http://www.certcc.or.kr/english, 2002.
2. H.S. Vaccaro and G.E. Liepins, “Detection of anomalous computer session activity,” In Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 280–289, 1989.
3. S. Axelsson, “Intrusion detection systems: A survey and taxonomy,” Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.
4. E. Biermann, E. Cloete and L. M. Venter, “A comparison of intrusion detection systems,” Computers & Security, vol 20, no. 8, pp. 676–683, December 2001.
5. T. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood and D. Wolber, “A network security monitor,” In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 296–304, Los Alamitos, CA, USA, 1990.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献