-
1
-
-
85027147693
-
-
http://www.ccrt.org/stats/cert-stats.htnil
-
-
-
-
2
-
-
85027134837
-
-
http://ciac.llnl.gov/ciac/CIACHome.html
-
-
-
-
4
-
-
85027172175
-
-
1998.
-
M. Asaka, "Information-gathering with mobile agents for intrusion detection system," IEICE Trans., vol.JSl-D-I, no.5, pp.532-539, 1998.
-
"Information-gathering with Mobile Agents for Intrusion Detection System," IEICE Trans., Vol.JSl-D-I, No.5, Pp.532-539
-
-
Asaka, M.1
-
5
-
-
85027166611
-
-
P. Porras, D. Schnackenberg, S. Staniford-Chen, M. Stillman, and F. Wu, " The common intrusion detection framework architecture," http://seclab.cs.ucdavis.cdu/cidf
-
D. Schnackenberg, S. Staniford-Chen, M. Stillman, and F. Wu, " the Common Intrusion Detection Framework Architecture," Http://seclab.cs.ucdavis.cdu/cidf
-
-
Porras, P.1
-
6
-
-
0028430224
-
-
1994.
-
B. Mukherjee, L.T. Hebcrlein, and K.M. Levitt, "Network intrusion detection," IEEE Network, vol.8, no.3, pp.2G-41, May/June 1994.
-
-
-
-
8
-
-
85027198931
-
-
JPCERT/CC Advisory 97-0003-phf CGI Attacks, JPCERT/CC, 1997.
-
JPCERT/CC Advisory 97-0003-phf CGI Attacks, JPCERT/CC, 1997.
-
-
-
-
9
-
-
85027178412
-
-
http://www.cs.purdue.edu/coast/intrusion-detection/ids.html
-
-
-
-
10
-
-
85027150702
-
-
94-013, Purdue University, Department of Computer Science, 1994.
-
S. Kumar and E. Spafford, "An application of pattern matching in intrusion detection," Technical Report 94-013, Purdue University, Department of Computer Science, 1994.
-
And E. Spafford, "An Application of Pattern Matching in Intrusion Detection," Technical Report
-
-
Kumar, S.1
-
11
-
-
0033329099
-
-
1999.
-
M. Iguchi and S. Goto, "Detecting malicious activities through port profiling," IEICE Trans. Inf. & Syst., vol.E82D, no.4, pp.784-792, April 1999.
-
And S. Goto, "Detecting Malicious Activities Through Port Profiling," IEICE Trans. Inf. & Syst., Vol.E82D, No.4, Pp.784-792, April
-
-
Iguchi, M.1
-
13
-
-
0029267472
-
-
1995
-
K. Ilgun, R.A. Kemmerer, and P.A. Porras, "State transition analysis: A rule-based intrusion detection approach," IEEE Trans. Software Engineering, vol.21, no.3, pp.181199, 1995
-
R.A. Kemmerer, and P.A. Porras, "State Transition Analysis: A Rule-based Intrusion Detection Approach," IEEE Trans. Software Engineering, Vol.21, No.3, Pp.181199
-
-
Ilgun, K.1
-
14
-
-
85027157482
-
-
1996. http://www.cs.dartmouth.edu/~agent
-
R. Gray, D. Rus, and D. Kotz, "Transportable information agents," Technical Report TR96-278, Department of Computer Science, Dartmouth College, 1996. http://www.cs.dartmouth.edu/~agent/
-
D. Rus, and D. Kotz, "Transportable Information Agents," Technical Report TR96-278, Department of Computer Science, Dartmouth College
-
-
Gray, R.1
-
15
-
-
85027112901
-
-
1998. http://actcomm.dartmouth.edu/papers/index.htm/#security
-
R. Gray, D. Kotz, G. Cybenko, and D. Rus. "Security in a multiple-language mobile-agent system," in Giovanni Vigna, editor, Lecture Notes in Computer Science: Mobile Agents and Security, Springer-Verlag, 1998. http://actcomm.dartmouth.edu/papers/index.htm/#security
-
D. Kotz, G. Cybenko, and D. Rus. "Security in A Multiple-language Mobile-agent System," in Giovanni Vigna, Editor, Lecture Notes in Computer Science: Mobile Agents and Security, Springer-Verlag
-
-
Gray, R.1
-
16
-
-
0003951497
-
-
Part No:8021965-10, Revision A, Sun Microsystems,Inc.
-
"SunSHIELD basic security module guide" Part No:8021965-10, Revision A, Sun Microsystems,Inc.
-
SunSHIELD Basic Security Module Guide
-
-
-
17
-
-
85027191703
-
-
16, no.3, pp.29-46, 1999.
-
W. Onogi, A. Shimizu, and H. Ohno, "A framework of network management worm," Computer Software, vol.16, no.3, pp.29-46, 1999.
-
A. Shimizu, and H. Ohno, "A Framework of Network Management Worm," Computer Software, Vol.
-
-
Onogi, W.1
-
18
-
-
85027103483
-
-
http://www.ipa.go.jp/SECURITY/pub/ida
-
-
-
|