Priorities in the Development of Network Intrusion Detection Systems.

作者: Marcin Dobrucki , Teemupekka Virtanen

DOI:

关键词:

摘要:

参考文章(9)
Jeff R. Allen, Driving by the rear-view mirror: managing a network with cricket NETA'99 Proceedings of the 1st conference on Conference on Network Administration - Volume 1. pp. 1- 1 ,(1999)
Grady Booch, James Rumbaugh, Ivar Jacobson, The unified software development process ,(1999)
Elizabeth D. Zwicky, D. Brent Chapman, Deborah Russell, Building Internet Firewalls ,(1995)
Micki Krause, Harold Tipton, Handbook of Information Security Management Edpacs. ,vol. 26, pp. 15- 15 ,(1998) , 10.1201/1079/43275.26.3.19980901/31739.5
S.E. Smaha, Haystack: an intrusion detection system annual computer security applications conference. pp. 37- 44 ,(1988) , 10.1109/ACSAC.1988.113412
Stephen Northcutt, Judy Novak, Donald McLachlan, Network Intrusion Detection: An Analyst's Handbook ,(2000)
Jon Lasser, Implementing Snort in a Production Environment. ;login:: the magazine of USENIX & SAGE. ,vol. 26, pp. 50- 54 ,(2001)
William Howe Tolman, Social engineering ,(1909)