메뉴 건너뛰기




Volumn 6, Issue 1, 1998, Pages 49-51

Intrusion Detection Systems: Threats, Taxonomy, Tuning

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84993074014     PISSN: 13590790     EISSN: 17587239     Source Type: Journal    
DOI: 10.1108/eb025861     Document Type: Review
Times cited : (3)

References (8)
  • 1
    • 0003478316 scopus 로고
    • The Architecture of a Network Level Intrusion Detection System
    • Technical Report, Dept. of Computer Science, University of New Mexico, August.
    • R. Heady, G. Luger, A. Maccabe and M. Servilla (1990) ‘The Architecture of a Network Level Intrusion Detection System’, Technical Report, Dept. of Computer Science, University of New Mexico, August.
    • (1990)
    • Heady, R.1    Luger, G.2    Maccabe, A.3    Servilla, M.4
  • 2
    • 0004048154 scopus 로고
    • Computer Security Threat Monitoring and Surveillance
    • Technical Report, James P. Anderson Co., Fort Washington, PA, April.
    • J. P. Anderson (1980) ‘Computer Security Threat Monitoring and Surveillance’, Technical Report, James P. Anderson Co., Fort Washington, PA, April.
    • (1980)
    • Anderson, J.P.1
  • 4
    • 84993048423 scopus 로고    scopus 로고
    • Computer Crime — an Historial Survey
    • Autumn
    • R. E. Overill (1997) ‘Computer Crime — an Historial Survey’, Defence Systems International, Autumn, pp. 102–103.
    • (1997) Defence Systems International , pp. 102-103
    • Overill, R.E.1
  • 5
    • 84993105323 scopus 로고    scopus 로고
    • Network Security Risks: a Question of Vulnerabilities x Threats
    • September
    • K. Black (1997) ‘Network Security Risks: a Question of Vulnerabilities x Threats’, Secure Computing, September, p. 47.
    • (1997) Secure Computing , pp. 47
    • Black, K.1
  • 6
    • 84993033277 scopus 로고    scopus 로고
    • Practical Intrusion Detection Introduction
    • Fed-CIRC, CSATC 97-063
    • S. Sparks and R. Pethia (1997) ‘Practical Intrusion Detection Introduction’, Fed-CIRC, CSATC 97-063, p. 32.
    • (1997) , pp. 32
    • Sparks, S.1    Pethia, R.2
  • 7
    • 0007473204 scopus 로고    scopus 로고
    • An Introduction to Intrusion Detection
    • URL org/crossroads/xrds2-1.
    • A. Sundaram (1996) An Introduction to Intrusion Detection, AMC Crossroads, Vol. 2, No. 4. URL http://www.acrn. org/crossroads/xrds2-1.
    • (1996) AMC Crossroads , vol.2 , Issue.4
    • Sundaram, A.1
  • 8
    • 0027609384 scopus 로고
    • A Survey of Intrusion Detection Techniques
    • T. F. Lunt (1993) ‘A Survey of Intrusion Detection Techniques’, Computers and Security, Vol. 12, No. 4, pp. 405–418.
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.