![]() In Proceedings of the 18th National Conference on Information Security, 1995. ![]() Spafford E H, Kumar S, A software architecture to support misuse intrusion detection. ACM Transactions on Information and System Security, Vol. Salvatore J Stolfo, Wenke Lee, A Framework for Constructing Features and Models for Intrusion Detection Systems. Paul Innella, A Brief History of Network Security and the Need for Adherence to the Software Process Model, Tetrad Digital Integrity, 2000. In: Proceedings of 17th international conference on machine learning, 2000. Bellovin, et al., Implementing a Distributed Firewall, ACM Communications, 2000.Įskin E, Anomaly detection over noisy data using learned probability distributions. S M Bellovin, W R Cheswick, Firewalls and Internet Security: Repelling the Wily Hacker, (Addison-Wesley, 1994). 4th International Conference on Parallel and Distributed Computing applications and technologies, pp. Zhang F, Zhou S, Qin Z, Liu J, Honeypot: a supplemented active defense system for network security, Proc.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |