메뉴 건너뛰기




Volumn , Issue , 2002, Pages 74-81

Design and implementation of unauthorized access tracing system

Author keywords

Access control; Computer crime; Information technology; Internet; Intrusion detection; Monitoring; Poles and towers; Prototypes; Routing; Telecommunication traffic

Indexed keywords

COMPUTER CRIME; INFORMATION TECHNOLOGY; INTERNET; INTRUSION DETECTION; MONITORING; TELECOMMUNICATION TRAFFIC;

EID: 84893121153     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAINT.2002.994453     Document Type: Conference Paper
Times cited : (11)

References (10)
  • 4
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP overlay network for tracking DoSFloods
    • August
    • R. Stone. "CenterTrack: An IP Overlay Network for Tracking DoSFloods", in Proceedings of the 9th USENIX Security Symposium, pages 199-212, August 2000.
    • (2000) Proceedings of the 9th USENIX Security Symposium , pp. 199-212
    • Stone, R.1
  • 6
    • 0007699438 scopus 로고    scopus 로고
    • Detection, defense, and tracking of Internet wide illegal access in distributed manner
    • July
    • K. Ohta, G. Mansfield, Y. Takei, and Y. Nemoto. "Detection, defense, and tracking of Internet wide illegal access in distributed manner", in Proceedings of INET 2000, July 2000. http://www.isoc.org/inet2000/cdproceedings/1f/1f2.htm.
    • (2000) Proceedings of INET 2000
    • Ohta, K.1    Mansfield, G.2    Takei, Y.3    Nemoto, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.