共 50 条
- [41] Mining TCP packets to detect stepping-stone intrusion (non-reviewed) PROCEEDINGS IEEE SOUTHEASTCON 2008, VOLS 1 AND 2, 2008, : 260 - 260
- [42] Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2110 - 2115
- [43] RTT-based Random Walk Approach to Detect Stepping-Stone Intrusion 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 558 - 563
- [44] Stepping-stone detection algorithm based on order preserving mapping 2007 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOLS 1 AND 2, 2007, : 275 - 282
- [48] A Hybrid Stepping-Stone Detection Algorithm to Counter Packet Jittering Evasion JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2014, 9 (02): : 83 - 92
- [49] Stepping-stone detection via request-response traffic analysis AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 276 - +
- [50] Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 546 - +