萌芽的心 发表于 2025-3-21 18:08:13

书目名称Recent Advances in Intrusion Detection影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0822816<br><br>        <br><br>书目名称Recent Advances in Intrusion Detection读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0822816<br><br>        <br><br>

自然环境 发表于 2025-3-21 21:01:50

https://doi.org/10.1007/3-540-39945-3Audit Control; Authentication; Blu-ray; Cryptoanalysis; Cryptographic Attacks; Data Mining; Distributed In

ELUC 发表于 2025-3-22 00:34:15

978-3-540-41085-0Springer-Verlag Berlin Heidelberg 2000

不可救药 发表于 2025-3-22 04:56:08

http://reply.papertrans.cn/83/8229/822816/822816_4.png

古老 发表于 2025-3-22 11:42:13

Hervé Debar,Ludovic Mé,S. Felix WuIncludes supplementary material:

货物 发表于 2025-3-22 14:47:42

A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusionsodel builder, where a data mining engine can receive audit data of a novel attack from an IDS, compute a new detection model, and then distribute it to other IDSs. We describe our experiences in implementing such system and the preliminary results of deploying the system in an experimental network.

DIKE 发表于 2025-3-22 17:34:53

A Real-Time Intrusion Detection System Based on Learning Program Behaviort a set of computer intrusions and normal usage to determine rates of correct detection and false alarms. A real-time system has since been developed that will enable deployment of a program-based intrusion detection system in a real installation.

LASH 发表于 2025-3-22 21:36:01

http://reply.papertrans.cn/83/8229/822816/822816_8.png

用不完 发表于 2025-3-23 02:18:33

Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Appr values. To make our approach more flexible, we construct, at the end of the training period, a tolerance interval for each numerical parameter. These intervals allow deviation between observed and learned values to be measured. This article presents our preliminary results and introduces our future works.

厚颜无耻 发表于 2025-3-23 08:38:06

LAMBDA: A Language to Model a Database for Detection of Attackst programs. These detection and verification aspects provide the language user with means to tailor the description of the attack to the needs of a specific intrusion detection system or a specific environment.
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Recent Advances in Intrusion Detection; Third International Hervé Debar,Ludovic Mé,S. Felix Wu Conference proceedings 2000 Springer-Verlag