共 50 条
- [21] Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2110 - 2115
- [22] Detecting Stepping-Stone Connection using Association Rule Mining 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 90 - 97
- [23] Detecting Stepping-Stone Intruders with Long Connection Chains FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 665 - +
- [24] Detecting Chaff Perturbation on Stepping-Stone Connection 2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 660 - 667
- [25] Online Sketching of Network Flows for Real-Time Stepping-Stone Detection 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 473 - 483
- [26] Detecting Multi-Hop Stepping-Stone Pairs with Chaff and Clock Skew JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 452 - 461
- [27] Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming 25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 151 - 158
- [28] Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 17 - 35
- [29] Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 1043 - 1050