共 50 条
- [21] Detecting Stepping-Stone Intruders with Long Connection Chains FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 665 - +
- [22] Detecting Stepping-Stone Connection using Association Rule Mining 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 90 - 97
- [23] Online Sketching of Network Flows for Real-Time Stepping-Stone Detection 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 473 - 483
- [24] Detecting Multi-Hop Stepping-Stone Pairs with Chaff and Clock Skew JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 452 - 461
- [25] Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 1043 - 1050
- [26] Using Dynamic Programming Techniques to Detect Multi-Hop Stepping-Stone Pairs in a Connection Chain 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 198 - 205
- [28] A Survey on Intrusion Detection Tools PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 806 - 810
- [30] Intrusion detection system for CubeSats: a survey 2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 596 - 601