[book]
Rebecca Gurley Bace
/ Intrusion Detection
/ Macmillan Technical Publishing
[book]
Anonymous
/ Maximum Security : A Hacker's Guide to Protecting Your Internet Site and Network -2e
/ Sams
[book]
Edward G. Amoroso
/ Intrusion Detection : An Introduction to internet Surveillance, Correlation, Traps, Trace Back, and Response
/ published by Intrusion.net books
[book]
Paul E. Proctor
/ The practical Intrusion Detection handbook
/ Prentice Hall PTR
[book]
David J. Marchette
/ Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint
/ Springer
[confproc]
Wenke Lee
/ 1999
/ Mining in a Data-flow Environment: Experience in Network Intrusion Detection
/ In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery & Data Mining
: 114~124
[journal]
김상찬
/ 2002
/ 퍼지제어를이용한 다중탐지센서의 통합탐지방법
/ 한국정보과학회 2002 가을 학술발표논문집
[journal]
David Moore
/ 2006
/ Inferring Internet denial of service activity
/ ACM Transaction on Computer System
24
(2)
: 115~139
[confproc]
H. S. Vaccaro
/ 1989
/ Detection of anomalous computer session activity
/ Proc. of the 1989 IEEE Symposium on Research in Security and Privacy
: 280~289
[confproc]
Cheri Dowell
/ 1990
/ The Computer Watch data reduction tool
/ Proc. of the 13th National Computer Security Conference
: 99~108
[web]
/ TCPDUMP public repository
/ http://www.tcpdump.org/
[web]
/ 1999 Darpa Intrusion Detection Evaluation
/ http://www.ll.mit.edu/IST/ideval/docs/docs_index.html