-
2
-
-
34248350691
-
-
Anderson, J. P. Computer Security Threat Monitoring and Surveillance. Technical Report Contract 79F296400, James P. Anderson Co., Box 42, Fort Washington, PA, 1980.
-
Anderson, J. P. Computer Security Threat Monitoring and Surveillance. Technical Report Contract 79F296400, James P. Anderson Co., Box 42, Fort Washington, PA, 1980.
-
-
-
-
5
-
-
0038223829
-
Intrusion Detection Systems
-
800-31, National Institute of Standards and Technology, Gaithersburg, MD, Accessed at
-
Bace, R. and Mell, P. Intrusion Detection Systems. NIST Special Report 800-31, National Institute of Standards and Technology, Gaithersburg, MD, 2001, Accessed at http://cnscenter.future.co.kr/resource/crypto/standard/ fips/sp 800-31.pdf.
-
(2001)
NIST Special Report
-
-
Bace, R.1
Mell, P.2
-
6
-
-
0347742772
-
Intrusion detection systems and multi-sensor data fusion
-
Bass, T. Intrusion detection systems and multi-sensor data fusion. Communications of the ACM, 43, 4 (2000), 99-105.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
8
-
-
34248348622
-
-
Gumstix, Inc, Accessed at
-
Gumstix, Inc. Gumstix Support Wiki. Accessed at http://docwiki.gumstix.org/Main_Page.
-
Gumstix Support Wiki
-
-
-
9
-
-
58049121411
-
-
Gumstix, Inc, Accessed at
-
Gumstix, Inc. Gumstix - Way small computing. Accessed at http://gumstix.com/index.html.
-
Gumstix - Way small computing
-
-
-
10
-
-
34248400701
-
-
US Department of Homeland Security Strategic Plan. U.S. Government, Washington, DC, Accessed at
-
Homeland Security, Department of. US Department of Homeland Security Strategic Plan. U.S. Government, Washington, DC, 2004, Accessed at http://www.dhs.gov/xlibrary/assets/DHS_StratPlan_FINAL_ spread.pdf.
-
(2004)
Homeland Security, Department of
-
-
-
11
-
-
34248399912
-
-
Homeland Security, Department of. The National Strategy to Secure Cyberspace. U.S. Government, Washington, DC, 2003, Accessed at http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf.
-
Homeland Security, Department of. The National Strategy to Secure Cyberspace. U.S. Government, Washington, DC, 2003, Accessed at http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf.
-
-
-
-
12
-
-
34248330309
-
-
Homeland Security, Department of. The National. Strategy for the Physical Protection of Critical Infrastructures and Key Assets. U.S. Government, Washington, DC, 2003, Accessed at http://www.dhs.gov/xlibrary/ assets/Physical Strategy.pdf.
-
Homeland Security, Department of. The National. Strategy for the Physical Protection of Critical Infrastructures and Key Assets. U.S. Government, Washington, DC, 2003, Accessed at http://www.dhs.gov/xlibrary/ assets/Physical Strategy.pdf.
-
-
-
-
13
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
Apr
-
Klemmerer, R.A. and Vigna, G. Intrusion detection: a brief history and overview. IEEE Computer, 35, 4 (Apr. 2002), 27-30.
-
(2002)
IEEE Computer
, vol.35
, Issue.4
, pp. 27-30
-
-
Klemmerer, R.A.1
Vigna, G.2
-
15
-
-
0003993827
-
-
Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, MA, Accessed at
-
Lincoln Laboratory. 1999 DARPA Intrusion Detection Evaluation Plan. Massachusetts Institute of Technology, Lexington, MA, 1999, Accessed at http://www.ll.mit.edu/IST/ideval/docs/1999/id99-eval-ll.html.
-
(1999)
1999 DARPA Intrusion Detection Evaluation Plan
-
-
-
17
-
-
0027609384
-
A survey of intrusion detection techniques
-
Lunt, T. F. A survey of intrusion detection techniques. Computers and Security, 12 (1993), 405-418.
-
(1993)
Computers and Security
, vol.12
, pp. 405-418
-
-
Lunt, T.F.1
-
18
-
-
34248375550
-
-
SANS.org. Intrusion Detection FAQ. Accessed at http://www.sans.org/resources/idfaq/.
-
SANS.org. Intrusion Detection FAQ. Accessed at http://www.sans.org/resources/idfaq/.
-
-
-
-
19
-
-
0007473204
-
An introduction to intrusion detection
-
Apr, Accessed at
-
Sundaram, A. An introduction to intrusion detection. Crossroads: The ACM Student Magazine, 2, 4 (Apr.1996), Accessed at http://www.acm.org/ crossroads/xrds2-4/intrus.html.
-
(1996)
Crossroads: The ACM Student Magazine
, vol.2
, pp. 4
-
-
Sundaram, A.1
-
20
-
-
0025548907
-
Security audit trail analysis using inductively generated predictive rules
-
March, IEEE Service Center, Piscataway, NJ
-
Teng, H. S., Chen, K., and Lu, S. C. Security audit trail analysis using inductively generated predictive rules. In Proceedings of the 11th National Conference on Artificial Intelligence Applications (March). IEEE Service Center, Piscataway, NJ, 1990, 24-29.
-
(1990)
Proceedings of the 11th National Conference on Artificial Intelligence Applications
, pp. 24-29
-
-
Teng, H.S.1
Chen, K.2
Lu, S.C.3
-
22
-
-
34248390054
-
-
TwoCrows.com. Data Mining Glossary. Accessed at http://www.twocrows.com/glossary.htm.
-
TwoCrows.com. Data Mining Glossary. Accessed at http://www.twocrows.com/glossary.htm.
-
-
-
-
23
-
-
34248326791
-
-
Wi-Fi Alliance, WPA2 (WiFi Protected Access 2). Accessed at http://www.wi-fi.org/knowledge_center/wpa2/.
-
Wi-Fi Alliance, WPA2 (WiFi Protected Access 2). Accessed at http://www.wi-fi.org/knowledge_center/wpa2/.
-
-
-
|