-
1
-
-
36549029609
-
-
Bishop Mathew. UNIX security: threats and solutions. In: Invited talk given at the 1995 system administration, networking, and security conference, Washington, DC; April 1995.
-
-
-
-
2
-
-
0003794137
-
-
Prentice Hall, Englewood Cliffs, NJ p. 211-3
-
Bertsekas D., and Gallager R. Data networks (1992), Prentice Hall, Englewood Cliffs, NJ p. 211-3
-
(1992)
Data networks
-
-
Bertsekas, D.1
Gallager, R.2
-
4
-
-
0003747598
-
-
NJ World Scientific Publishing Co, River Edge, London
-
Friedman M., and Kandel A. Introduction to pattern recognition: statistical, structural, neural, and fuzzy logic approaches (1999), NJ World Scientific Publishing Co, River Edge, London
-
(1999)
Introduction to pattern recognition: statistical, structural, neural, and fuzzy logic approaches
-
-
Friedman, M.1
Kandel, A.2
-
5
-
-
36549045838
-
-
Garvey TD, Lunt TF. Model based intrusion detection. In: Proceedings of the 14th national computer security conference, Baltimore, MD; October 1991. p. 373-85.
-
-
-
-
8
-
-
0031632265
-
-
Li Qiong, Mills David L. On the long-range dependence of packet round-trip delays in Internet. In: Proceedings of international conference on communications (ICC'98), Atlanta, USA, No. 1; June 1998. p 1185-92.
-
-
-
-
10
-
-
0029323403
-
Wide-area traffic: the failure of poisson modeling
-
Paxson V., and Floyd S. Wide-area traffic: the failure of poisson modeling. IEEE/ACM Trans Netw 3 (1995) 226-244
-
(1995)
IEEE/ACM Trans Netw
, vol.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
11
-
-
0003883721
-
-
O'Reilly & Associates, Inc, Sebastopol, CA
-
Russell D., and Gangemi Sr. G.T. Computer security basics (December 1991), O'Reilly & Associates, Inc, Sebastopol, CA
-
(1991)
Computer security basics
-
-
Russell, D.1
Gangemi Sr., G.T.2
-
12
-
-
0029232080
-
-
Staniford-Chen S, Heberlein L Todd. Holding intruders accountable on the Internet. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA; 1995. p. 39-49.
-
-
-
-
13
-
-
36549053379
-
-
Yoda K, Etoh H. Finding connection chain for tracing intruders. In: Proceedings of 6th European symposium on research in computer security (LNCS 1985), Toulouse, France; 2000. p. 31-42.
-
-
-
-
14
-
-
48049087759
-
Detecting long connecting chains of interactive terminal sessions
-
Springer Press, Zurich, Switzerland
-
Yung K.H. Detecting long connecting chains of interactive terminal sessions. RAID 2002 (October 2002), Springer Press, Zurich, Switzerland 1-16
-
(2002)
RAID 2002
, pp. 1-16
-
-
Yung, K.H.1
-
15
-
-
77952908143
-
-
Yang Jianhua, Huang Shou-Hsuan Stephen. A real-time algorithm to detect long connection chains of interactive terminal sessions. In: Proceedings of 3rd international conference on information security (Infosecu'04), Shanghai, China; November 2004. p. 198-203.
-
-
-
-
16
-
-
26444507627
-
-
Yang Jianhua, Huang Shou-Hsuan Stephen. Matching TCP packets and its application to the detection of long connection chains. In: Proceedings (IEEE) of 19th international conference on advanced information networking and applications (AINA'05), Taipei, Taiwan; March 2005. p. 1005-10.
-
-
-
-
17
-
-
36549019776
-
-
Ylonen T. SSH protocol architecture. Draft IETF document, ; June 2004a.
-
-
-
-
18
-
-
36549012475
-
-
Ylonen T. SSH transport layer protocol. Draft IETF document, ; June 2004b.
-
-
-
-
19
-
-
85084161090
-
-
Zhang Yin, Paxson Vern. Detecting stepping-stones. In: Proceedings of the 9th USENIX security symposium, Denver, CO; August 2000. p. 67-81.
-
-
-
|