메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Provenance-aware security risk analysis for hosts and network flows

Author keywords

[No Author keywords available]

Indexed keywords

ITERATIVE METHODS;

EID: 84904188964     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOMS.2014.6838250     Document Type: Conference Paper
Times cited : (8)

References (17)
  • 3
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative sources in a hyperlinked environment
    • Sep.
    • J. M. Kleinberg, "Authoritative sources in a hyperlinked environment," J. ACM, vol. 46, no. 5, pp. 604-632, Sep. 1999.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 604-632
    • Kleinberg, J.M.1
  • 8
    • 84904216477 scopus 로고    scopus 로고
    • [Online; accessed 1-October]
    • "The Honeynet project, scan 18," http://old.honeynet.org/scans/ scan18/, [Online; accessed 1-October-2012].
    • (2012) The Honeynet Project, Scan 18
  • 10
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • ser. LISA '99. Berkeley, CA, USA: USENIX Association, [Online]
    • M. Roesch, "Snort - lightweight intrusion detection for networks," in Proceedings of the 13th USENIX conference on System administration, ser. LISA '99. Berkeley, CA, USA: USENIX Association, 1999, pp. 229-238. [Online]. Available: http://dl.acm.org/citation.cfm?id= 1039834.1039864
    • (1999) Proceedings of the 13th USENIX Conference on System Administration , pp. 229-238
    • Roesch, M.1
  • 11
    • 77954235092 scopus 로고    scopus 로고
    • A survey on page rank computing
    • P. Berkhin, "A survey on Page Rank computing," Internet Mathematics, vol. 2, no. 1, pp. 73-120, 2005.
    • (2005) Internet Mathematics , vol.2 , Issue.1 , pp. 73-120
    • Berkhin, P.1
  • 14
    • 65249128484 scopus 로고    scopus 로고
    • What's going on?: Learning communication rules in edge networks
    • Aug.
    • S. Kandula, R. Chandra, and D. Katabi, "What's going on?: learning communication rules in edge networks," SIGCOMM Comput. Commun. Rev., vol. 38, no. 4, pp. 87-98, Aug. 2008.
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.4 , pp. 87-98
    • Kandula, S.1    Chandra, R.2    Katabi, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.