Author:
Lippmann Richard,Haines Joshua W,Fried David J,Korba Jonathan,Das Kumar
Subject
Computer Networks and Communications
Reference24 articles.
1. J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, E. Stoner, State of the practice of intrusion detection technologies, Carnegie Mellon University/Software Engineering Institute Technical Report CMU/SEI-99-TR-028, January 2000
2. E.G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, 1999
3. K. Das, The development of stealthy attacks to evaluate intrusion detection systems, S.M. Thesis, MIT Department of Electrical Engineering and Computer Science, June 2000
4. H. Debar, M. Dacier, A. Wespi, S. Lampart, An experimental workbench for intrusion detection systems, Research Report RZ 2998 (#93044), IBM Research Division, Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, 9 March 1999, http://www.zurich.ibm.com/Technology/Security/extern/gsal/docs/index.html
5. Testing and evaluating computer intrusion detection systems;Durst;Communications of the ACM,1999
Cited by
401 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献