An intelligent agent security intrusion system
暂无分享,去创建一个
William J. Buchanan | Mike Mannion | John Pikoulas | Kostas Triantafyllopoulos | W. Buchanan | M. Mannion | K. Triantafyllopoulos | John Pikoulas
[1] William J. Buchanan,et al. Software agents and computer network security , 2000, Proceedings Seventh IEEE International Conference and Workshop on the Engineering of Computer-Based Systems (ECBS 2000).
[2] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[3] Eugene H. Spafford,et al. Defending a Computer System Using Autonomous Agents , 1995 .
[4] Chris Herringshaw. Detecting Attacks on Networks , 1997, Computer.
[5] Georges A. Darbellay,et al. Forecasting the short-term demand for electricity: Do neural networks stand a better chance? , 2000 .
[6] Bruce Schneier,et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists , 1996 .
[7] Bradley P. Carlin,et al. BAYES AND EMPIRICAL BAYES METHODS FOR DATA ANALYSIS , 1996, Stat. Comput..
[8] A. Rukhin. Bayes and Empirical Bayes Methods for Data Analysis , 1997 .
[9] Matthew J. Weiner,et al. Efficient DES Key Search , 1994 .
[10] Ralph Howard,et al. Data Encryption Standard , 1987, Definitions.