메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 253-258

Graphical techniques in intrusion detection systems

Author keywords

Authorization; Computer industry; Computer network reliability; Explosives; Information security; Intelligent networks; Internet; Intrusion detection; Performance analysis; Telecommunication traffic

Indexed keywords

COMPLEX NETWORKS; COMPUTER CRIME; EXPLOSIVES; EXPLOSIVES DETECTION; GRAPHIC METHODS; INTELLIGENT NETWORKS; INTERNET; MERCURY (METAL); RELIABILITY ANALYSIS; SECURITY OF DATA; TELECOMMUNICATION INDUSTRY; TELECOMMUNICATION TRAFFIC;

EID: 70350625971     PISSN: 19767684     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICOIN.2001.905436     Document Type: Conference Paper
Times cited : (8)

References (6)
  • 1
    • 0347224231 scopus 로고
    • A linear time pattern matching algorithm between a string and a tree
    • Proc. 4th Symp. Combinatorial Pattern Matching, Springer-Verlag
    • T. Akutsu, A linear time pattern matching algorithm between a string and a tree, Proc. 4th Symp. Combinatorial Pattern Matching, Lecture Notes in Computer Science, Springer-Verlag, pp.1-10, 1993.
    • (1993) Lecture Notes in Computer Science , pp. 1-10
    • Akutsu, T.1
  • 6
    • 0027609384 scopus 로고
    • A Survey of Intrusion Detection Techniques
    • June
    • Teresa F. Lunt, A Survey of Intrusion Detection Techniques, Computers and Security, 12(4): 405-418, June 1993.
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.