메뉴 건너뛰기




Volumn , Issue , 2003, Pages 601-604

Learning rules for anomaly detection of hostile network traffic

Author keywords

[No Author keywords available]

Indexed keywords


EID: 78149297786     PISSN: 15504786     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (128)

References (11)
  • 3
    • 26844479111 scopus 로고    scopus 로고
    • J. Hoagland, SPADE, Silicon Defense, http://www.silicondefense.com/ software/spice/, 2000.
    • (2000) SPADE
    • Hoagland, J.1
  • 5
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA Off-Line Intrusion Detection Evaluation
    • 2000
    • R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, & K. Das (2000), "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4), 2000, pp. 579-595.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 10
    • 0003539116 scopus 로고    scopus 로고
    • Snort - Lightweight Intrusion Detection for Networks
    • M. Roesch, "Snort - Lightweight Intrusion Detection for Networks", Proc. USENIX Lisa, 1999.
    • Proc. USENIX Lisa, 1999
    • Roesch, M.1
  • 11
    • 84944220475 scopus 로고    scopus 로고
    • Adaptive, Model-based Monitoring for Cyber Attack Detection
    • A. Valdes & K. Skinner, "Adaptive, Model-based Monitoring for Cyber Attack Detection", Proc. RAID, 2000, pp. 80-92.
    • Proc. RAID, 2000 , pp. 80-92
    • Valdes, A.1    Skinner, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.