共 50 条
- [1] An attack signature model to computer security intrusion detection 2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1368 - 1373
- [2] Towards An Attack Signature Generation Framework for Intrusion Detection Systems 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 597 - 603
- [3] NETWORK INTRUSION DETECTION: USING MDLCOMPRESS FOR DEEP PACKET INSPECTION 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 994 - +
- [6] Layered Security Architecture for Masquerade Attack Detection DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 255 - 262
- [7] Decoy Document Deployment for Effective Masquerade Attack Detection DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 35 - 54
- [8] Multi Application User Profiling for Masquerade Attack Detection ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 676 - 684
- [9] Attack Signature Matching using Graphics Processors in High-Performance Intrusion Detection Systems 2013 21ST IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2013,
- [10] Database Intrusion Detection by Transaction Signature 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,