메뉴 건너뛰기




Volumn 10, Issue 3, 2005, Pages 140-149

An overview of network evasion methods

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK EVASION METHODS; NETWORK SECURITY; SECURITY DEVICES;

EID: 27644486238     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2005.07.003     Document Type: Article
Times cited : (6)

References (29)
  • 6
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Handley M, Paxson V, Kreibich C. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In: Proceeding USENIX security symposium; 2001.
    • (2001) Proceeding USENIX Security Symposium
    • Handley, M.1    Paxson, V.2    Kreibich, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.