Subject
Computer Networks and Communications
Reference49 articles.
1. Y. Meng, L.F. Kwok, A generic scheme for the construction of contextual signatures with hash function in intrusion detection, in: Proceedings of International Conference on Computational Intelligence and Security (CIS), 2011, pp. 978–982.
2. Bro: a system for detecting network intruders in real-time;Paxson;Computer Networks,1999
3. Guide to Intrusion Detection and Prevention Systems (IDPS);Scarfone,2007
4. P.A. Porras, R.A. Kemmerer, Penetration state transition analysis: a rule-based intrusion detection approach, in: Proceedings of the 8th Annual Computer Security Applications Conference (ACSAC), pp. 220–229, 1992.
5. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory;McHugh;ACM Transactions on Information System Security,2000
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献