共 11 条
[1]
Axelsson S, 1999, TR9817 CHALM U TECHN
[2]
da Silva Paulo Fernando, 2007, International Journal of Network Management, V17, P287, DOI 10.1002/nem.626
[3]
Towards a taxonomy of intrusion-detection systems
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
1999, 31 (08)
:805-822
[4]
Feng G., 2006, P AS PAC C SERV COMP, P526
[5]
Foster I., 1998, 5th ACM Conference on Computer and Communications Security, P83, DOI 10.1145/288090.288111
[6]
Franke HA, 2007, P 3 INT C WIR MOB CO, P19
[7]
Idris NB, 2005, INDICON 2005 PROCEEDINGS, P52
[8]
Kenny S, 2005, LECT NOTES COMPUT SC, V3470, P275
[9]
Leu FY, 2005, 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, P304
[10]
Schulp A.S., 2008, Proceedings of the Second Mosasaur Meeting, Fort Hays Studies, P1

