Intrusion and intrusion detection
From MaRDI portal
Publication:4707239
DOI10.1007/S102070100001zbMATH Open1036.68502OpenAlexW2067361528MaRDI QIDQ4707239FDOQ4707239
Authors:
Publication date: 2001
Published in: International Journal of Information Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s102070100001
Recommendations
Data encryption (aspects in computer science) (68P25) Performance evaluation, queueing, and scheduling in the context of computer systems (68M20) Network protocols (68M12)
Cited In (29)
- Title not available (Why is that?)
- Computer intrusion: Detecting masquerades.
- Intrusion detection system with hybrid detector
- On a probabilistic model of intrusion detection
- Computer Aided Verification
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A decisional framework system for computer network intrusion detection
- Using data-independence in the analysis of intrusion detection systems
- Intrusion detections in collaborative organizations by preserving privacy
- Classification trees as a technique for creating anomaly-based intrusion detection systems
- Multiresolution anomaly detection method for fractional Gaussian noise
- Intrusion detection and correlation. Challenges and solutions
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A hybrid intrusion detection system design for computer network security
- Title not available (Why is that?)
- VisRAID: visualizing remote access for intrusion detection
- A pattern recognition algorithm applied in intrusion detection
- Attack chain detection
- Information Security
- Towards a theory of intrusion detection
- String distances and intrusion detection: Bridging the gap between formal languages and computer security
- Applied Cryptography and Network Security
- Title not available (Why is that?)
- Title not available (Why is that?)
This page was built for publication: Intrusion and intrusion detection
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4707239)