共 34 条
[1]
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[2]
[Anonymous], ACM SIGOPS OPERATING
[3]
[Anonymous], 2002, Host Discovery with NMAP
[4]
BALASUBRAMANIYA.J, 1998, P COMP SEC APPL C
[5]
Bauer D. S., 1988, Proceedings of the Computer Networking Symposium (Cat. No.88CH2547-8), P98, DOI 10.1109/CNS.1988.4983
[6]
Bernardes MC, 2000, INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, P158, DOI 10.1109/PDSE.2000.847862
[7]
Budiarto R., 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications (IEEE Cat. No.04EX852), P565, DOI 10.1109/ICTTA.2004.1307887
[8]
Honeypots: Practical means to validate malicious fault assumptions - Practical experience report
[J].
10TH IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS,
2004,
:383-388
[10]
Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P118