共 19 条
[1]
[Anonymous], 2004, Intrusion detection and correlation: challenges and solutions
[2]
[Anonymous], 1998, 924111 ISO
[3]
ISO 9241-11 Revised: What Have We Learnt About Usability Since 1998?
[J].
HUMAN-COMPUTER INTERACTION: DESIGN AND EVALUATION, PT I,
2015, 9169
:143-151
[4]
Broadcom, 2019, INTERNET SECURITY TH
[5]
Butt D. S., 2018, EFFICIENCY PROCESSES
[6]
A framework for the evaluation of intrusion detection systems
[J].
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2006,
:63-+
[8]
Towards a taxonomy of intrusion-detection systems
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
1999, 31 (08)
:805-822
[9]
Jaferian P., 2008, P 2 ACM S COMP HUM I P 2 ACM S COMP HUM I, P1, DOI DOI 10.1145/1477973.1477983