메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 128-130

Dependable Intrusion Tolerance: Technology demo

Author keywords

Prototypes; Resists

Indexed keywords

INTRUSION TOLERANCE; INTRUSION TOLERANT; PROTOTYPE IMPLEMENTATIONS; PROTOTYPES; RESISTS;

EID: 84855385416     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194946     Document Type: Conference Paper
Times cited : (3)

References (8)
  • 4
    • 84940110274 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
    • Oakland, CA, May
    • U. Lindqvist and P. A. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146-161, Oakland, CA, May 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 5
    • 0038289958 scopus 로고    scopus 로고
    • Security Advisory AL20010717, eEye Digital Security, July
    • R. Permeh and M. Maiffret. .ida "Code Red" worm. Security Advisory AL20010717, eEye Digital Security, July 2001.
    • (2001) ida "Code Red" Worm
    • Permeh, R.1    Maiffret, M.2
  • 8
    • 84944220475 scopus 로고    scopus 로고
    • Adaptive, model-based monitoring for cyber attack detection
    • Recent Advances in Intrusion Detection (RAID'00), Oct.
    • A. Valdes and K. Skinner. Adaptive, model-based monitoring for cyber attack detection. In Recent Advances in Intrusion Detection (RAID'00), volume 1907 of LNCS, pages 54-68, Oct. 2000.
    • (2000) LNCS , vol.1907 , pp. 54-68
    • Valdes, A.1    Skinner, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.