共 7 条
[3]
A framework for constructing features and models for intrusion detection systems[J] . Wenke Lee,Salvatore J. Stolfo.ACM Transactions on Information and System Security (TISSEC) . 2000 (4)
[4]
The 1999 DARPA off-line intrusion detection evaluation[J] . Richard Lippmann,Joshua W Haines,David J Fried,Jonathan Korba,Kumar Das.Computer Networks . 2000 (4)
[6]
Attack Development for Intrusion Detection Evalua-tion .2 Kumar J D. Massachusetts Institute of Technology . 1999
[7]
Defcon Capture the Flag:Defending Vulnerable Code from Intense Attack.DARPA Information Survivability Conference and Expo (DISCEX III) .2 Cowan C,Arnold S,Beattie S M,et al. . 2003