|
Volumn , Issue , 2005, Pages 1905-1912
|
Evolving computer intrusion scripts for vulnerability assessment and log analysis
|
Author keywords
Agent based model; Hacker; Log analysis; Script kiddies; Vulnerability assessment
|
Indexed keywords
COMPUTER CRIME;
COMPUTER OPERATING SYSTEMS;
COMPUTER SCIENCE;
COMPUTER SIMULATION;
INFORMATION TECHNOLOGY;
SPAMMING;
COMPUTER ATTACK;
COMPUTER INTRUSION SCRIPTS;
LOG ANALYSIS;
VULNERABILITY ASSESSMENT;
COMPUTATIONAL METHODS;
|
EID: 32444436252
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1068009.1068331 Document Type: Conference Paper |
Times cited : (12)
|
References (6)
|