-
2
-
-
80052933495
-
High-speed intrusion detection in support of critical infrastructure protection
-
Antonio, S. D., Oliviero, F. and Setola, R. 2006. High-speed intrusion detection in support of critical infrastructure protection. Critical Information Infrastructure Security, 4347: 222 - 234.
-
(2006)
Critical Information Infrastructure Security
, vol.4347
, pp. 222-234
-
-
Antonio, S.D.1
Oliviero, F.2
Setola, R.3
-
3
-
-
0003199305
-
Overview and principles of Internet traffic engineering
-
Awduche, D., Chiu, A., Elwalid, A., Widjaja, I. and Xiao, X. 2002. Overview and principles of Internet traffic engineering. RFC, 3272: 4 - 7.
-
(2002)
RFC
, vol.3272
, pp. 4-7
-
-
Awduche, D.1
Chiu, A.2
Elwalid, A.3
Widjaja, I.4
Xiao, X.5
-
4
-
-
84881017210
-
Remote monitoring
-
Cisco Systems. (n.d.)
-
Cisco Systems. (n.d.). Remote monitoring. Internetworking technologies handbook (Chapter 55), 1992-2006 http://www.cisco.com/en/US/docs/Internetworking/technology/handbook/RMON.htm (http://www.cisco.com/en/US/docs/Internetworking/technology/handbook/RMON.htm)
-
Internetworking technologies handbook (Chapter 55), 1992-2006
-
-
-
5
-
-
84880968956
-
-
Cisco Systems. (n.d.)
-
Cisco Systems. (n.d.). Cisco IOS netflow data sheet, 1992-2006 http://www.cisco.com/en/US/products/ps6601/products_data_sheet0900aecd80173f71.htm (http://www.cisco.com/en/US/products/ps6601/products_data_sheet0900aecd80173f71.htm)
-
Cisco IOS netflow data sheet, 1992-2006
-
-
-
7
-
-
84880983359
-
-
James, C. (2000). Passive Measurement http://wand.cs.waikato.ac.nz/old/wand/publications/jamie_420/final/node9.html (http://wand.cs.waikato.ac.nz/old/wand/publications/jamie_420/final/node9.html)
-
(2000)
Passive Measurement
-
-
James, C.1
-
8
-
-
84880998715
-
Incident response and computer forensics
-
Mandia, K., Prosise, C. and Pepe, M. 2006. Incident response and computer forensics. TMH,: 14 - 15.
-
(2006)
TMH
, pp. 14-15
-
-
Mandia, K.1
Prosise, C.2
Pepe, M.3
-
10
-
-
84880990967
-
-
ProCurve Networking by MP
-
ProCurve Networking by MP. (2005). Traffic Management for the Enterprise http://www.hp.com/rnd/pdfs/traffic_management_paper.pdf (http://www.hp.com/rnd/pdfs/traffic_management_paper.pdf)
-
(2005)
Traffic Management for the Enterprise
-
-
-
12
-
-
84865223572
-
Computer Security Incident Handling Guide
-
Scarfone, K., Grance, T. and Masone, K. 2008. Computer Security Incident Handling Guide. NIST Special Publication 800-61, pp.,: 4 - 9.
-
(2008)
NIST Special Publication 800-61
, pp. 4-9
-
-
Scarfone, K.1
Grance, T.2
Masone, K.3
-
13
-
-
84880969224
-
-
Sellens, J. (2000). System and network monitoring.;login: http://www.usenix.org/publications/login/2000-6/features/monitoring.html (http://www.usenix.org/publications/login/2000-6/features/monitoring.html)
-
(2000)
System and network monitoring.;login
-
-
Sellens, J.1
-
14
-
-
50049093730
-
-
Master Thesis, Helsinki University of TechnologyRetrieved from
-
Viipuri, T. (2004). Traffic analysis and modeling of IP core networks. Master Thesis, Helsinki University of TechnologyRetrieved from http://www.netlab.tkk.fi/julkaisut/tyot/diplomityot/1039/diplomityo.pdf (http://www.netlab.tkk.fi/julkaisut/tyot/diplomityot/1039/diplomityo.pdf)
-
(2004)
Traffic analysis and modeling of IP core networks
-
-
Viipuri, T.1
|