Author:
Shah Khushboo,Jonckheere Edmond,Bohacek Stephan
Publisher
Springer Science and Business Media LLC
Reference58 articles.
1. Kent S: On the trail of intrusions into information systems. IEEE Spectrum 2000,37(12):52-56. 10.1109/6.887597
2. Moore D, Voelker G, Savage S: Inferring internet denial of service activity. Proceedings of the 10th USENIX Security Symposium, August 2001, Washington, DC, USA
3. Paxson V: Bro: a system for detecting network intruders in real-time. IEEE Computer Networks 1999,31(23-24):2435-2463. 10.1016/S1389-1286(99)00112-7
4. Roesch M: Snort-lightweight intrusion detection for networks. Proceedings of the USENIX LISA Conference on System Administration, November 1999, Seattle, Wash, USA 229-238.
5. Staniford S, Hoagland JA, McAlerney JM: Practical automated detection of stealthy portscans. Journal of Computer Security 2002,10(1-2):105-136.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献