共 3 条
[2]
Incentive-based modeling and inference of attacker intent, objectives, and strategies[J] . Peng Liu,Wanyu Zang,Meng Yu.ACM Transactions on Information and System Security (TISSEC) . 2005 (1)
[3]
Practical automated detection of stealthy portscans[J] . Stuart Staniford,James A. Hoagland,Joseph M. McAlerney.Journal of Computer Security . 2002 (1,2)