Intrusion detection systems and multisensor data fusion

被引:528
作者
Bass, T [1 ]
机构
[1] USAF, Informat Ctr, Washington, DC 20330 USA
关键词
D O I
10.1145/332051.332079
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
[No abstract available]
引用
收藏
页码:99 / 105
页数:7
相关论文
共 12 条
[1]  
[Anonymous], 1987, PROTOTYPE IDES REAL
[2]   E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity [J].
Bass, T ;
Freyre, A ;
Gruber, D ;
Watt, G .
IEEE NETWORK, 1998, 12 (02) :10-17
[3]  
Bauer D. S., 1988, Proceedings of the Computer Networking Symposium (Cat. No.88CH2547-8), P98, DOI 10.1109/CNS.1988.4983
[4]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[5]  
Hall D. L., 1992, MATH TECHNIQUES MULT
[6]  
Heberlein L. T., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P296, DOI 10.1109/RISP.1990.63859
[7]  
HOCHBERG, 1993, COMPUTERS SECURITY, P235
[8]   NETWORK INTRUSION DETECTION [J].
MUKHERJEE, B ;
HEBERLEIN, LT ;
LEVITT, KN .
IEEE NETWORK, 1994, 8 (03) :26-41
[9]  
SNAPP S, 1991, P IEEE COMPCOM MAR, P170
[10]  
Varshney P., 1995, DISTRIBUTED DETECTIO