메뉴 건너뛰기




Volumn 3, Issue 6, 2008, Pages 403-406

Intrusion detection using autonomous agents

Author keywords

Architectures; Autonomous agents; Commercial IDs; Intrusion detection

Indexed keywords


EID: 79551616943     PISSN: 18169503     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (9)
  • 4
    • 0003405432 scopus 로고
    • The C Programming Language
    • 2nd Edn Englewood Cliffs, NJ 07632, USA
    • Kemighan, B.W. and D.M. Ritchie, 1988. The C Programming Language. Prentice-Hall. 2nd Edn. Englewood Cliffs, NJ 07632, USA.
    • (1988) Prentice-Hall
    • Kemighan, B.W.1    Ritchie, D.M.2
  • 5
    • 0028430224 scopus 로고
    • Network intrusion detection
    • Network
    • Mukherjee, B., T.L. Heberlein and K.N. Levitt, 1994. Network intrusion detection. IEEE. Network, 8(3): 26-41.
    • (1994) IEEE , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, T.L.2    Levitt, K.N.3
  • 8
    • 0004207406 scopus 로고    scopus 로고
    • Programming Perl. 2nd Edn
    • O'Reilly and Associates, Inc
    • Wall, L., T. Christiansen and R.L. Schwartz, 1996. Programming Perl. 2nd Edn. O'Reilly and Associates, Inc.
    • (1996)
    • Wall, L.1    Christiansen, T.2    Schwartz, R.L.3
  • 9
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: A peer-based intrusion detection system
    • White, G.B., E.A. Fisch and U.W. Pooch, 1996. Cooperating security managers: A peer-based intrusion detection system. IEEE Network, pp: 20-23.
    • (1996) IEEE Network , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.