Intrusion threat detection

作者: Jeffrey D. Hodges

DOI:

关键词:

摘要: A system is disclosed that can be used to monitor for an attempted intrusion of access system. The detects event in the and determines whether a type being monitored. If monitored, reports information about event. This by rules engine or other process determine if was part

参考文章(99)
Edward M. Batchelder, Charles E. Dumont, John T. Chamberlain, Andrew J. Warton, Cache override control in an apparatus for caching dynamic content ,(1999)
Lawrence Sampson, Raul Medina, Marco Fanti, Emilio Belmonte, Multi-domain access control ,(2000)
B. Skaggs, B. Blackburn, G. Manes, S. Shenoi, Network vulnerability analysis The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002.. ,vol. 3, ,(2002) , 10.1109/MWSCAS.2002.1187081
Derk Norton, David L. Wood, Michael B. Dilger, Yunas Nadiadi, Thomas Pratt, Security architecture with environment sensitive credential sufficiency evaluation ,(1999)
Martin Dickau, Lori C. Marchak, Jeffrey G. MacAllister, Patrice A. Tegan, Product development system and method using integrated process and data management ,(1996)