-
1
-
-
84874656062
-
-
Proceedings of the Symposium Sur La Sécurité des Technologies de l'Information et des Communications, June 1-3, Rennes, France
-
Alata, E., M. Dacier, Y. Deswarte, M. Kaaniche and K. Kortchinsky et al., 2005. Leurré.com: Retour d'expérience sur plusieurs mois d'utilisation d'un pot de miel distribué mondialement. Proceedings of the Symposium Sur La Sécurité des Technologies de l'Information et des Communications, June 1-3, Rennes, France.
-
(2005)
Leurré.com: Retour D'expérience Sur Plusieurs Mois D'utilisation D'un Pot De Miel Distribué Mondialement
-
-
Alata, E.1
Dacier, M.2
Deswarte, Y.3
Kaaniche, M.4
Kortchinsky, K.5
-
2
-
-
77958132042
-
Collection and analysis of attack dated based on honeypots deployed on the Internet
-
Springer US. Quality of Protection
-
Alata, E., M. Dacier, Y. Deswarte, M. Kaaniche and K. Kortchinsky et al., 2006. Collection and analysis of attack dated based on honeypots deployed on the Internet. Advances in Information Security, Springer US. Quality of Protection, pp: 79-91.
-
(2006)
Advances In Information Security
, pp. 79-91
-
-
Alata, E.1
Dacier, M.2
Deswarte, Y.3
Kaaniche, M.4
Kortchinsky, K.5
-
3
-
-
0003618624
-
-
2nd Edn., Springer, NewYork, ISBN: 978-0387985091
-
Bremaud, P., 2001. Markov Chains: Gibbs field, Monte Carlo Simulations and Queues. 2nd Edn., Springer, NewYork, ISBN: 978-0387985091.
-
(2001)
Markov Chains: Gibbs Field, Monte Carlo Simulations and Queues
-
-
Bremaud, P.1
-
4
-
-
60349108231
-
A new statistical approach to network anomaly detection
-
Jun. 16-18, Edinburgh, UK, pp
-
Callegari, C., S. Vaton and M. Pagano, 2008. A new statistical approach to network anomaly detection. Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Jun. 16-18, Edinburgh, UK, pp: 441-447.
-
(2008)
Proceedings of The International Symposium On Performance Evaluation of Computer and Telecommunication Systems
, pp. 441-447
-
-
Callegari, C.1
Vaton, S.2
Pagano, M.3
-
5
-
-
74349089494
-
-
1st Edn., Dunod, Britain, ISBN-13: 978-2100520831
-
Graham, C., 2008. Chaînes de Markov: Cours. 1st Edn., Dunod, Britain, ISBN-13: 978-2100520831, pp: 274.
-
(2008)
Chaînes De Markov: Cours
, pp. 274
-
-
Graham, C.1
-
6
-
-
33748573657
-
An algorithm for universal lossless compression with side information
-
Haixiao, C., S. Kulkarni and S. Verdu, 2006. An algorithm for universal lossless compression with side information. IEEE Trans. Inform. Theory, 52: 4008-4016.
-
(2006)
Ieee Trans. Inform. Theory
, vol.52
, pp. 4008-4016
-
-
Haixiao, C.1
Kulkarni, S.2
Verdu, S.3
-
7
-
-
0034829265
-
Markov chains, classifiers and intrusion detection
-
Jha, S., K. Tan and R.A. Maxion, 2001. Markov chains, classifiers and intrusion detection. Proceedings of 14th IEEE Computer Security Foundations Workshop, (CSFW'01), IEEE Computer Society, pp:206-219.
-
(2001)
Proceedings of 14th Ieee Computer Security Foundations Workshop, (csfw'01), Ieee Computer Society
, pp. 206-219
-
-
Jha, S.1
Tan, K.2
Maxion, R.A.3
-
8
-
-
0035616570
-
A hybrid high-order markov chain model for computer intrusion detection
-
Ju, W.H. and Y. Vardi, 2001. A hybrid high-order markov chain model for computer intrusion detection. J. Comput. Graph. Statistics, 10: 277-295.
-
(2001)
J. Comput. Graph. Statistics
, vol.10
, pp. 277-295
-
-
Ju, W.H.1
Vardi, Y.2
-
9
-
-
67249143791
-
Empirical analysis and statistical modeling of attack processes based on honeypots
-
June 25-28, Philadelphia, USA
-
Kaaniche, M., Y. Deswarte, E. Alata, M. Dacier and V. Nicomette, 2006. Empirical analysis and statistical modeling of attack processes based on honeypots. Proceedings of the WEEDS 2006-Workshop on Empirical Evaluation of Dependability and Security, June 25-28, Philadelphia, USA., pp: 1-6.
-
(2006)
Proceedings of The Weeds 2006-workshop On Empirical Evaluation of Dependability and Security
, pp. 1-6
-
-
Kaaniche, M.1
Deswarte, Y.2
Alata, E.3
Dacier, M.4
Nicomette, V.5
-
10
-
-
84888274530
-
Introduction à scilab-exercices pratiques corriges d'algebre linéaire
-
Kaber, S.M., 2002. Introduction à scilab-exercices pratiques corriges d'algebre linéaire. Ellipses Marketing, pp: 226.
-
(2002)
Ellipses Marketing
, pp. 22
-
-
Kaber, S.M.1
-
11
-
-
74349102233
-
-
2nd Edn., O'Reilly Media Inc., USA., pp
-
Lockhart, A., 2004. Network Intrusion Detection Network Security Hack. 2nd Edn., O'Reilly Media Inc., USA., pp: 348-412.
-
(2004)
Network Intrusion Detection Network Security Hack
, pp. 348-412
-
-
Lockhart, A.1
-
12
-
-
0003201842
-
A markov chain model of temporal behavior for anomaly detection
-
June 6-7, West Point, New York, pp
-
Nong, Y., 2000. A markov chain model of temporal behavior for anomaly detection. Proceedings of the IEEE Workshop on Information Assurance and Security United States Military Academy, June 6-7, West Point, New York, pp: 171-174.
-
(2000)
Proceedings of The Ieee Workshop On Information Assurance and Security United States Military Academy
, pp. 171-174
-
-
Nong, Y.1
-
16
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C.E., 1948. A mathematical theory of communication. Bell Syst. Tech. J., 27: 379-423.
-
(1948)
Bell Syst. Tech. J
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
|