共 17 条
- [1] [Anonymous], 2002, Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, DOI DOI 10.1145/586110.586144
- [2] [Anonymous], 2000 DARPA INTRUSION
- [3] Cuppens F, 2002, P IEEE S SECUR PRIV, P202, DOI 10.1109/SECPRI.2002.1004372
- [4] Cuppens F., 2002, SECI 02 P 2002 INT C, P153
- [5] DEBAR H, 2001, RFC4765
- [6] A TRANSLATION APPROACH TO PORTABLE ONTOLOGY SPECIFICATIONS [J]. KNOWLEDGE ACQUISITION, 1993, 5 (02): : 199 - 220
- [7] Julisch Klaus., 2002, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, P366, DOI [10.1145/775047.775101, DOI 10.1145/775047.775101]
- [8] MITRE Corporation, COMM VULN EXP
- [9] Ning P., 2004, ACM Transactions on Information and Systems Security, V7, P591, DOI 10.1145/1042031.1042036
- [10] NING P, 2001, TR200113 N CAR STAT