-
1
-
-
22544432380
-
-
Pearson Education, Inc., Upper Saddle River, NJ
-
Beasley, J.S., Networking, Pearson Education, Inc., Upper Saddle River, NJ, 2004
-
(2004)
Networking
-
-
Beasley, J.S.1
-
3
-
-
24944574614
-
-
Retrieved April 15, 2004
-
CERT Coordination Center. CERT/CC statistics 1988-2004. Retrieved April 15, 2004 from http://www.cert.org/stats/cert_stats.html
-
CERT/CC Statistics 1988-2004
-
-
-
5
-
-
33750841186
-
Detecting network intrusions based on a generalized rough set model
-
Sept. 10-12, Shiraz, Iran
-
Han, J., Kowalski, K., Beheshti, M.,Detecting Network Intrusions Based on a Generalized Rough Set Model. Proceedings of the International Symposium on Telecommunications IST-2005, Sept. 10-12, 2005, Shiraz, Iran, pp 247-252
-
(2005)
Proceedings of the International Symposium on Telecommunications IST-2005
, pp. 247-252
-
-
Han, J.1
Kowalski, K.2
Beheshti, M.3
-
6
-
-
0003478316
-
-
Technical report, Computer Science Department, University of New Mexico, August
-
Heady, R., Luger, G., Maccabe, A., Servilla, M., The architecture of a network level intrusion detection system. Technical report, Computer Science Department, University of New Mexico, August 1990.
-
(1990)
The Architecture of a Network Level Intrusion Detection System
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
7
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, TX, January
-
Lee, W., Stolfo, S., Data Mining Approaches for Intrusion Detection, Proceedings of the Seventh USENK Security Symposium (SECURITY '98), San Antonio, TX, January 1998
-
(1998)
Proceedings of the Seventh USENK Security Symposium (SECURITY '98)
-
-
Lee, W.1
Stolfo, S.2
-
8
-
-
84964411176
-
Real time data miningbased intrusion detection
-
Retrieved
-
Lee, W., Stolfo, S.J., Chan, P.K., Real Time Data Miningbased Intrusion Detection, Proc. Second DARPA Information Survivability Conference and Exposition, 2001, Retrieved from http://citeseer.ist.psu.edu/452795.html
-
Proc. Second DARPA Information Survivability Conference and Exposition, 2001
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
-
9
-
-
6344224504
-
-
Retrieved January 6, 2006
-
Llinas, J., Data Fusion Overview. Retrieved January 6, 2006 from http://www.infofusion.buffalo.edu/tm/Dr.Llinas'stuff/DataFusi onOverview.ppt
-
Data Fusion Overview
-
-
Llinas, J.1
-
10
-
-
84860026544
-
-
Retrieved May 29, 2004
-
Network intrusion prevention systems. Retrieved May 29, 2004 from http://www.networkintrusion.co.uk/inline.htm.
-
Network Intrusion Prevention Systems
-
-
-
11
-
-
84860023182
-
Nitro data systems
-
Retrieved July 30,2004
-
Nitro Data Systems. Intrusion prevention: A white paper. Retrieved July 30,2004 from http://www.bitpipe.com/detail/RES/1090433720_603.html?src =TRM_TOPN.
-
Intrusion Prevention: A White Paper
-
-
-
13
-
-
84860037235
-
-
Retrieved April 29, 2004
-
Analyst, Securities, Services and Solutions. Retrieved April 29, 2004 from http://netsecurity.about.com/gi/dynamic/offsite.htm?zi=1/XJ&s dn=netsecurity&zu=http%3A%2F%2Fwww.csoonline.com%2 Fanalyst%Freport1265. html.
-
Analyst, Securities, Services and Solutions
-
-
-
15
-
-
84860024491
-
-
Network World. Retrieved May 20, 2004
-
Snyder, J., Newman, D., & Thayer, R. How we did it. Network World. Retrieved May 20, 2004 from http://www.nwfusion.com/reviews/2004/0216ipshow.html
-
How We Did it
-
-
Snyder, J.1
Newman, D.2
Thayer, R.3
|