Author:
Chauhan Minakshi,Agarwal Mohit
Reference66 articles.
1. Anderson James P.Computer security threat monitoring and surveillance. Technical Report James P. Anderson Company 1980.
2. Allen J. Christie A. Fithen W. McHugh J. Pickel J. Stoner E. State of the practice of intrusion detection technologies. No. CMU/SEI‐99‐TR‐028. CARNEGIE‐MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST 2000.
3. An intrusion‐detection model;Denning D.E.;IEEE Trans. Software Eng.,1987
4. Axelsson S. Research in intrusion‐detection systems: A survey Technical report 98‐17 p. 120 Department of Computer Engineering Chalmers University of Technology 1998.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献