메뉴 건너뛰기




Volumn Part F146266, Issue , 1992, Pages 220-229

Penetration state transition analysis a rule-based intrusion detection approach

Author keywords

[No Author keywords available]

Indexed keywords

EXPERT SYSTEMS;

EID: 84873309550     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.1992.228217     Document Type: Conference Paper
Times cited : (96)

References (18)
  • 2
    • 84937648928 scopus 로고
    • Restricted Distribution, Department of Computer Science, Purdue University, West Lafayette, IN, April
    • M. Bishop, "Security Problem with the Unix Operating System", [Restricted Distribution], Department of Computer Science, Purdue University, West Lafayette, IN, April 1982.
    • (1982) Security Problem with the Unix Operating System
    • Bishop, M.1
  • 7
    • 0003892692 scopus 로고
    • Masters Thesis, Computer Science Department, University of California, Santa Barbara, July
    • K. Ilgun, "USTAT: A Real-Time Intrusion Detection System for Unix", Masters Thesis, Computer Science Department, University of California, Santa Barbara, July 1992.
    • (1992) USTAT: A Real-Time Intrusion Detection System for Unix
    • Ilgun, K.1
  • 9
    • 3943093755 scopus 로고
    • Real-time intrusion detection
    • San Francisco, CA, February
    • T. F. Lunt, "Real-Time Intrusion Detection", Proceedings COMPCON, San Francisco, CA, February 1989.
    • (1989) Proceedings COMPCON
    • Lunt, T.F.1
  • 17
    • 84941476194 scopus 로고
    • Virtual VAX-11 Version, Computer Science Division, Department of Electrical and Computer Sciences, University of California, Berkeley, CA, August
    • Unix Programmer's Manual, 4.2 Berkeley Software Distribution, Virtual VAX-11 Version, Computer Science Division, Department of Electrical and Computer Sciences, University of California, Berkeley, CA, August 1983.
    • (1983) Unix Programmer's Manual, 4.2 Berkeley Software Distribution


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.