메뉴 건너뛰기




Volumn 2008, Issue 9, 2008, Pages 10-12

Characterising intrusion detection sensors

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; SENSORS;

EID: 51549087756     PISSN: 13534858     EISSN: None     Source Type: Trade Journal    
DOI: 10.1016/S1353-4858(08)70107-7     Document Type: Article
Times cited : (5)

References (17)
  • 2
    • 0036090464 scopus 로고    scopus 로고
    • Florian Kerschbaum, Eugene H. Spafford, and Diego Zamboni. "Using internal sensors and embedded detectors for intrusion detection". Journal of Computer Security, 10(1-2): 23-70.
    • Florian Kerschbaum, Eugene H. Spafford, and Diego Zamboni. "Using internal sensors and embedded detectors for intrusion detection". Journal of Computer Security, 10(1-2): 23-70.
  • 3
    • 51549120258 scopus 로고    scopus 로고
    • Frederic Avolio. "Firewalls and Internet security, the second hundred (Internet) years". The Internet Protocol Journal, 2(2): 24-32.
    • Frederic Avolio. "Firewalls and Internet security, the second hundred (Internet) years". The Internet Protocol Journal, 2(2): 24-32.
  • 4
    • 51549117396 scopus 로고    scopus 로고
    • David Koblas. "SOCKS". 3rd USENIX UNIX Security Symposium, Baltimore, MD, USA. USENIX Association, 1992.
    • David Koblas. "SOCKS". 3rd USENIX UNIX Security Symposium, Baltimore, MD, USA. USENIX Association, 1992.
  • 5
    • 51549093266 scopus 로고    scopus 로고
    • D. Brent Chapman and Elizabeth D. Zwicky. 'Proxy Systems'. Chapter 7 in Building Internet Firewalls. O'Reilly, 1995.
    • D. Brent Chapman and Elizabeth D. Zwicky. 'Proxy Systems'. Chapter 7 in Building Internet Firewalls. O'Reilly, 1995.
  • 6
    • 51549117395 scopus 로고    scopus 로고
    • Charlie Russel, Sharon Crawford, and Jason Gerend. 'Managing Users and Groups'. Chapter 9 in Microsoft Windows Server 2003 Administrator's Companion. Microsoft Press, 2003.
    • Charlie Russel, Sharon Crawford, and Jason Gerend. 'Managing Users and Groups'. Chapter 9 in Microsoft Windows Server 2003 Administrator's Companion. Microsoft Press, 2003.
  • 7
    • 51549098077 scopus 로고    scopus 로고
    • Simson Garfinkel, Gene Spafford, and Alan Schwartz. 'Users, passwords, and authentication'. Chapter 4 in Practical UNIX and Internet Security. O'Reilly, 2003.
    • Simson Garfinkel, Gene Spafford, and Alan Schwartz. 'Users, passwords, and authentication'. Chapter 4 in Practical UNIX and Internet Security. O'Reilly, 2003.
  • 8
    • 51549083926 scopus 로고    scopus 로고
    • Peter Szor. 'Antivirus Defense techniques. Chapter 11 in The Art of Computer Virus Research and Defense'. Symantec, 2005.
    • Peter Szor. 'Antivirus Defense techniques. Chapter 11 in The Art of Computer Virus Research and Defense'. Symantec, 2005.
  • 9
    • 84948951525 scopus 로고    scopus 로고
    • Matthew W. Williamson. "Throttling Viruses: Restricting propagation to defeat malicious mobile code". 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA. Washington: IEEE Computer Society, 2002.
    • Matthew W. Williamson. "Throttling Viruses: Restricting propagation to defeat malicious mobile code". 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA. Washington: IEEE Computer Society, 2002.
  • 10
    • 51549103787 scopus 로고    scopus 로고
    • Jim McBee. 'Microsoft Exchange Server 2003 Advanced Administration'. Sybex, 2006.
    • Jim McBee. 'Microsoft Exchange Server 2003 Advanced Administration'. Sybex, 2006.
  • 11
    • 51549112601 scopus 로고    scopus 로고
    • SpamAssassin. 3 August 2008 .
    • SpamAssassin. 3 August 2008 .
  • 12
    • 51549111071 scopus 로고    scopus 로고
    • PureMessage. Sophos. 3 August 2008 .
    • PureMessage. Sophos. 3 August 2008 .
  • 13
    • 0034300682 scopus 로고    scopus 로고
    • Eugene H. Spafford and Diego Zamboni. "Intrusion detection using autonomous agents". Computer Networks, 34(4): 547-570.
    • Eugene H. Spafford and Diego Zamboni. "Intrusion detection using autonomous agents". Computer Networks, 34(4): 547-570.
  • 14
    • 51549100128 scopus 로고    scopus 로고
    • Christopher Krugel and Thomas Toth. "Applying mobile agent technology to intrusion detection". Workshop on Software Engineering and Mobility at the 23rd International Conference on Software Engineering, 2001.
    • Christopher Krugel and Thomas Toth. "Applying mobile agent technology to intrusion detection". Workshop on Software Engineering and Mobility at the 23rd International Conference on Software Engineering, 2001.
  • 15
    • 84867752517 scopus 로고    scopus 로고
    • Midori Asaka, T. Onabuta, T. Inoue, and S. Goto. "The Use of Mobile Agents in Tracing an Intruder in a Local Area Network". 6th Pacific Rim International Conference on Artificial Intelligence, Melbourne, Australia. LNCS Volume 1886/2000: 373-382. Springer, 2000.
    • Midori Asaka, T. Onabuta, T. Inoue, and S. Goto. "The Use of Mobile Agents in Tracing an Intruder in a Local Area Network". 6th Pacific Rim International Conference on Artificial Intelligence, Melbourne, Australia. LNCS Volume 1886/2000: 373-382. Springer, 2000.
  • 16
    • 51549101518 scopus 로고    scopus 로고
    • OSSEC. 3 August 2008 .
    • OSSEC. 3 August 2008 .
  • 17
    • 51549084510 scopus 로고    scopus 로고
    • Rebecca G. Bace. 'Analysis Schemes'. Chapter 4 of Intrusion Detection. Macmillan, 2000.
    • Rebecca G. Bace. 'Analysis Schemes'. Chapter 4 of Intrusion Detection. Macmillan, 2000.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.