메뉴 건너뛰기




Volumn , Issue , 2005, Pages 69-75

Adaptive defense against various network attacks

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE SYSTEMS; NETWORK SECURITY; SYSTEMS ANALYSIS;

EID: 47249156592     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (17)
  • 1
    • 84860927616 scopus 로고    scopus 로고
    • CERT
    • CERT. CERT/CC advisories. http://www.cert.org/advisories/.
    • CERT/CC advisories
  • 7
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • (August)
    • KIM, H., AND KARP, B. Autograph: Toward automated, distributed worm signature detection. In Proceedings of 13th USENIX Security Symposium (August 2004).
    • (2004) Proceedings of 13th USENIX Security Symposium
    • KIM, H.1    KARP, B.2
  • 8
    • 8344261545 scopus 로고    scopus 로고
    • Packetscore: Statistical-based overload control against distributed denial-ofservice attacks
    • (March)
    • KIM, Y., LAU, W., CHUAH, M., AND CHAO, H. Packetscore: Statistical-based overload control against distributed denial-ofservice attacks. In Proceedings of the IEEE INFOCOM (March 2004).
    • (2004) Proceedings of the IEEE INFOCOM
    • KIM, Y.1    LAU, W.2    CHUAH, M.3    CHAO, H.4
  • 9
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • LEE, W., FAN, W., MILLER, M., STOLFO, S., AND ZADOK, E. Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 10, 1,2 (2002).
    • (2002) Journal of Computer Security , vol.10 , Issue.1 , pp. 2
    • LEE, W.1    FAN, W.2    MILLER, M.3    STOLFO, S.4    ZADOK, E.5
  • 14
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise networks
    • STANIFORD, S. Containment of scanning worms in enterprise networks. Journal of Computer Security (2003).
    • (2003) Journal of Computer Security
    • STANIFORD, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.