共 7 条
[1]
http://www.docshow.net .
[2]
Implementing a Generalized Tool for Monitoring. Ranum M T,Landfield K,Stolarchuk M,etc. . 1988
[3]
Building a Security Monitor with Adaptive User Work Profiles. Halme L,Kahn B. Proceedings of the 11th National Computer Security Conferece . 1988
[4]
Computer Security Threat Monitoring and Surveillance. Anderson J P. Technical Report Contract 79F .
[5]
An Intrusion Detection Model. Denning DE. IEEE Transactions on Software Engineering . 1987
[6]
Expert Systems in Intrusion Detection:A Case Study. Sebring M M,Shellhouse E,Hanna M E,etc. Proceedings of the 11th National Computer Security Conferece . 1988
[7]
Automated Audit Trail Analysis and Intrusion Detection: ASurvey. Lunt T F. Proceedings of the 11th National Computer Security Conferece . 1988